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", @typed={0x14, 0x81, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00'}]}, @nested={0x10be, 0x78, 0x0, 0x1, [@typed={0x1004, 0x7b, 0x0, 0x0, @binary="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"}, @typed={0x4, 0x1e}, @typed={0xc, 0x6c, 0x0, 0x0, @u64=0x400}, @generic="b679024d55b54c9f4a1261ca2f328bed898f3857519e51764b3c60d60f31ba07babd60c87e57063e8fd5bab981593a5ae98b24727e36afc7834fce21272882757769b179e994f65dbeb1f51253b6f732eae0d227a4023de99d8a3373767ea6da43ff996d9cf184d9cf0a4ad6c10a0999fe0e928fd74157d09f1e753c7243b26ad1275cb52ebfe5567c24531a5d5ca81a13bc55471b04", @typed={0x8, 0x65, 0x0, 0x0, @ipv4=@private=0xa010101}, @typed={0x8, 0x7a, 0x0, 0x0, @uid}]}, @typed={0x4, 0x5b}, @typed={0xec, 0x3d, 0x0, 0x0, @binary="ef7c376912398af623625ea0948553dd9472df6433a2ea4b53c21c98d707b556fdb91464defc02fffdc03658fc8be75ab9524d7eec0b7d758cda35788d109c7d3e72da9c6f6fe1144fa2c466d42117c2bdd58e293344c2784a6ccdda466563cfbdb822c4e20e5dfdb37863a7037321bed6f53fb3476aa5eceae2a8495f9ab1d5e2a234374f3a13205f648f1b03a2a603e5d2c8fb16eeae81b2a45934b3b9b0b60d3a0805855aa48406afbe48c1e476b591437a7dab7a048810e00041a292ed0027527728171da08626e37fec3b677c217a911b97adbd5403c6a0686ecb63acae559076a5e5f79f0e"}]}, 0x21d8}, {&(0x7f0000004c00)={0x174, 0x12, 0x2, 0x70bd29, 0x25dfdbfd, "", [@nested={0x163, 0x7a, 0x0, 0x1, [@typed={0x8, 0x53, 0x0, 0x0, @u32=0x7284097b}, @generic="fe95f6da830d855a1aaafd0208d8e7038cdbbc8394d6dacbeaa817bec8b6c1126f3fee0d2cd3c6f90ec1006d3feff3b1efec00613ad0f9ed7e1ee29c0dd2e62dd9348700e56dec86e103834f50ca90fa5d7d766f14", @typed={0x4, 0x82}, @generic="838b9ae930911e97d5c0036e813dd9068aeca868030cdeb31d3fdd233544ead088d528c6ac2e3233c02a95f09e2539d83b5d7017dcc7d8322c826414a52a8f60c5a25014fca58a5a2f3a01eabd6c16f567b8082bc5d1aa016cdaf53b8697e84644036ddc8112653038bd7744e736128d938faa2b787ac106b7b662b7054614ff2ffa297e6da5f0db251f1fb8b100661edc05b2af964521ecc2a0f6686069b79506330976c557296565ccd6", @typed={0x8, 0x90, 0x0, 0x0, @fd=r2}, @generic="911cd3d3cafa88078b720e3ee9b4a69ea6389731053e8a671995c96319d9b7c5611c4e918cb3b12a99d7a8da60d0598e1591335e62a31910a58b568ee7c16265ffea039600a526fdf8bbac"]}]}, 0x174}, {&(0x7f0000004d80)={0x20, 0x37, 0x4, 0x70bd2a, 0x25dfdbfb, "", [@typed={0x4, 0x4}, @typed={0xc, 0x1, 0x0, 0x0, @u64=0x6}]}, 0x20}, {&(0x7f0000004dc0)={0xf0, 0x2b, 0x100, 0x70bd28, 0x25dfdbfb, "", [@typed={0x8, 0x29, 0x0, 0x0, @ipv4=@multicast2}, @generic="4fc5160a665fab87d234442df5b793cebd84c6093a387da1b0ac612a456d2bc4e7b637c558bdce5c10974906ddbeb242706af50e18bdadb2aeb875b9263fe5ef1d983bbe6723609050811aec9f10368847dd48224a9eeccc9304e49e32c3181574124d401f175be2d3487b1072a8aa72b26d6d6ce825f0d001cf98f71142a6c0b4633df7362f47c6e4174564735b4cf46ca3893578e45293a44866ed866a7f5c385e1f9b24dd3c418edd77c09d015049d37a446e5aba6b1cdbf9a10c461d81ff545f9a71794fed0c98e5d8e6cb7654", @typed={0x8, 0x8b, 0x0, 0x0, @u32=0x8001}]}, 0xf0}], 0x7, &(0x7f0000004f80)=[@cred={{0x1c, 0x1, 0x2, {r5, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x14, 0x1, 0x1, [r6]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xee01}}}], 0x58, 0x800}, 0x0) (async) r8 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_percpu\x00', 0x0, 0x0) sendmsg$NL80211_CMD_GET_KEY(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xac, 0x0, 0x100, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4, 0x2d}}}}, [@NL80211_ATTR_KEY_DEFAULT_TYPES={0x10, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "063eb40718"}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY={0x64, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_DEFAULT_TYPES={0x20, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_IDX={0x5, 0x2, 0x4}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "80ba4c72fe"}, @NL80211_KEY_DEFAULT_TYPES={0x14, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac01}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x40680c4}, 0x8000) (async) ioctl$TUNDETACHFILTER(r8, 0x401054d6, 0x0) [ 769.487398] erofs: unmounted for /dev/loop2 [ 769.500745] squashfs: SQUASHFS error: unable to read fragment index table [ 769.502331] erofs: read_super, device -> /dev/loop5 [ 769.519752] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 769.530601] erofs: cannot find valid erofs superblock 07:25:45 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:25:45 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004060000000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 769.606839] erofs: read_super, device -> /dev/loop4 07:25:45 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0xffffffffffffffdb, 0x0, 0x0, 0x0, 0x80, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x2200c001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd7, 0x44045, 0x0, 0x0) shutdown(r1, 0x2) recvmsg(r1, &(0x7f0000001500)={&(0x7f0000000100)=@sco={0x1f, @none}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000640)=""/154, 0x9a}, {&(0x7f0000000400)=""/188, 0xbc}, {&(0x7f0000000200)=""/6, 0x6}, {&(0x7f0000000500)=""/188, 0xbc}, {0x0}, {0x0}, {&(0x7f0000000900)=""/166, 0xa6}, {&(0x7f00000009c0)=""/244, 0xf4}, {&(0x7f0000000800)=""/50, 0x32}], 0x9}, 0x1) fdatasync(r1) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'wlan0\x00'}) ioctl(r0, 0x8b1a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 769.639105] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 769.668863] erofs: root inode @ nid 36 [ 769.704105] squashfs: SQUASHFS error: unable to read fragment index table [ 769.722769] erofs: mounted on /dev/loop4 with opts: noacl. 07:25:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0xffffffffffffffdb, 0x0, 0x0, 0x0, 0x80, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x2200c001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd7, 0x44045, 0x0, 0x0) shutdown(r1, 0x2) recvmsg(r1, &(0x7f0000001500)={&(0x7f0000000100)=@sco={0x1f, @none}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000640)=""/154, 0x9a}, {&(0x7f0000000400)=""/188, 0xbc}, {&(0x7f0000000200)=""/6, 0x6}, {&(0x7f0000000500)=""/188, 0xbc}, {0x0}, {0x0}, {&(0x7f0000000900)=""/166, 0xa6}, {&(0x7f00000009c0)=""/244, 0xf4}, {&(0x7f0000000800)=""/50, 0x32}], 0x9}, 0x1) fdatasync(r1) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'wlan0\x00'}) ioctl(r0, 0x8b1a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0xffffffffffffffdb, 0x0, 0x0, 0x0, 0x80, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) (async) sendto$inet6(r1, 0x0, 0x0, 0x2200c001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) (async) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd7, 0x44045, 0x0, 0x0) (async) shutdown(r1, 0x2) (async) recvmsg(r1, &(0x7f0000001500)={&(0x7f0000000100)=@sco={0x1f, @none}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000640)=""/154, 0x9a}, {&(0x7f0000000400)=""/188, 0xbc}, {&(0x7f0000000200)=""/6, 0x6}, {&(0x7f0000000500)=""/188, 0xbc}, {0x0}, {0x0}, {&(0x7f0000000900)=""/166, 0xa6}, {&(0x7f00000009c0)=""/244, 0xf4}, {&(0x7f0000000800)=""/50, 0x32}], 0x9}, 0x1) (async) fdatasync(r1) (async) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'wlan0\x00'}) (async) ioctl(r0, 0x8b1a, &(0x7f0000000040)) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000000)) (async) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) 07:25:45 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000006000000006000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) 07:25:45 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 769.767085] erofs: read_super, device -> /dev/loop2 [ 769.772400] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 769.791548] erofs: root inode @ nid 36 [ 769.808959] erofs: read_super, device -> /dev/loop5 07:25:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0xffffffffffffffdb, 0x0, 0x0, 0x0, 0x80, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x2200c001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd7, 0x44045, 0x0, 0x0) shutdown(r1, 0x2) recvmsg(r1, &(0x7f0000001500)={&(0x7f0000000100)=@sco={0x1f, @none}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000640)=""/154, 0x9a}, {&(0x7f0000000400)=""/188, 0xbc}, {&(0x7f0000000200)=""/6, 0x6}, {&(0x7f0000000500)=""/188, 0xbc}, {0x0}, {0x0}, {&(0x7f0000000900)=""/166, 0xa6}, {&(0x7f00000009c0)=""/244, 0xf4}, {&(0x7f0000000800)=""/50, 0x32}], 0x9}, 0x1) fdatasync(r1) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'wlan0\x00'}) ioctl(r0, 0x8b1a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0xffffffffffffffdb, 0x0, 0x0, 0x0, 0x80, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) (async) sendto$inet6(r1, 0x0, 0x0, 0x2200c001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) (async) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd7, 0x44045, 0x0, 0x0) (async) shutdown(r1, 0x2) (async) recvmsg(r1, &(0x7f0000001500)={&(0x7f0000000100)=@sco={0x1f, @none}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000640)=""/154, 0x9a}, {&(0x7f0000000400)=""/188, 0xbc}, {&(0x7f0000000200)=""/6, 0x6}, {&(0x7f0000000500)=""/188, 0xbc}, {0x0}, {0x0}, {&(0x7f0000000900)=""/166, 0xa6}, {&(0x7f00000009c0)=""/244, 0xf4}, {&(0x7f0000000800)=""/50, 0x32}], 0x9}, 0x1) (async) fdatasync(r1) (async) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'wlan0\x00'}) (async) ioctl(r0, 0x8b1a, &(0x7f0000000040)) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000000)) (async) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) [ 769.825566] erofs: unmounted for /dev/loop4 [ 769.828585] erofs: bogus i_mode (0) @ nid 36 [ 769.837770] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 769.857155] erofs: cannot find valid erofs superblock 07:25:45 executing program 1: ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f00000000c0)=ANY=[@ANYBLOB]) bind$rxrpc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$udf(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x290c, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="01000200a400010054fbf001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0xc000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c16351c1d002a4c696e757820554446465300000000000000000000000405", 0xde, 0xc0c0}, {&(0x7f0000010500)="0000000000000000010000000000000000000000000000000000000000000000060002002d0001002caee8016100000002000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x7d, 0xc1e0}, {&(0x7f0000010600)="000000000000000000000000000000000000000900020000002a4f5354412055444620436f6d706c69616e74000000005001000000000000000200002000000000000000000000004000000001000000002a4c696e757820554446465300000000000000000000000405", 0x6a, 0xc2c0}, {&(0x7f0000010700)="00000000000000000000000000000000004000008000000002400000002a554446205370617261626c6520506172746974696f6e5001040500000000010000002000020038010000a0000000e0070000000000000000000000000000000000000500020055000100c535f001620000000500000001000000002b4e53523032000000000000000000000000000000000000000000000000000002", 0x9a, 0xc3a0}, {&(0x7f0000010800)="0000000000000000000000000000000000000000000000000300000020050000a0020000002a4c696e757820554446465300000000000000000000000405", 0x3e, 0xc4a0}, {&(0x7f0000011100)="02000200fd0001008f77f00100010000004000006000000000400000c007", 0x1e, 0x20000}, {&(0x7f0000011200)="07010200b3000100204840000000000000000000040000000100000100000000000000002800000000340040060000000012004037000000003e004041000000003e004061000000003e044081", 0x4d, 0xa4000}, {&(0x7f0000011a00)="0001020098000100e59ef001200000007810e4070913142c16351c1d0300030001000000010000000000000000000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x79, 0xa8000}, {&(0x7f0000011b00)="00000000000000000000000000000009004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446000000000000000000000000000000000000000000000908436f707972696768740000000000000000000000000000000000000000000a084162737472616374000000000000000000000000000000000000000000000900020000400000000000000000000000002a4f5354412055444620436f6d706c69616e74000000005001", 0xda, 0xa80e0}, {&(0x7f0000012200)="05010200cd0001005381b0004000000000000000040000000100000400000000000001000000000000000000a53c00000200000000000000440100000000000001000000000000000010e4070913122c16351c1d0010e4070913122c17130e360010e4070913122c17130e360100000000000000000000000000000000000000002a4c696e757820554446465300000000000000000000000405000000000000000000000000000000000000100000004401000060", 0xb5, 0xac000}], 0x0, &(0x7f0000013300)=ANY=[]) r0 = open(0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x2, @perf_config_ext={0x3, 0x7f}, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/../file0\x00', 0x419e02, 0x0) pwritev(r1, &(0x7f00000006c0)=[{&(0x7f0000000780)="c3", 0x47fffe0}], 0x8, 0x400fa7f, 0x4) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) sendmmsg(r3, &(0x7f0000001700)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000019b17200"/26], 0x18, 0xe000}, 0x5}], 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, 0x0) sendmsg$NL80211_CMD_AUTHENTICATE(r2, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f00000003c0)="c0f800f3676820fbf247747ba458352f51e5b4c21512ee8984f961988b43043a88842f50997493fe4ee06403510ec8c80a7cef21891e981257943b7a2f69c1f13b357bbb98370c4da0c09276b0badeed07e9abaf71bd5bf168c8a2b7ae23669092cf383abb4b6bedd37d3e5350deb8593e2fec73375084f309c652f31dc9b3311070b84f0a88a64dae3c60eaab81cfe07e3af5dc71ab1c75292801284fc9430257b3fd05d7e24a302a524bbf337e8a8424fa0b8771dfa713744d8492e2b87c4d71d034a74a742cdaa21f", 0xca, 0x8820, 0x0, 0x0) close(0xffffffffffffffff) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x400002172, 0xffffffffffffffff, 0x0) 07:25:45 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004068000000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:25:45 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:45 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 770.024172] squashfs: SQUASHFS error: unable to read fragment index table [ 770.052183] erofs: read_super, device -> /dev/loop4 [ 770.064179] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, 07:25:45 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:25:45 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 770.102966] erofs: root inode @ nid 36 [ 770.113277] erofs: bogus i_mode (0) @ nid 36 [ 770.124841] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2020/09/19 18:44 (1000) 07:25:45 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f00406c000000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 770.215066] erofs: read_super, device -> /dev/loop5 [ 770.234315] erofs: read_super, device -> /dev/loop2 [ 770.242017] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 770.258676] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 770.268372] squashfs: SQUASHFS error: unable to read fragment index table [ 770.295366] erofs: cannot find valid erofs superblock [ 770.302899] erofs: root inode @ nid 36 07:25:46 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 770.314389] erofs: bogus i_mode (0) @ nid 36 07:25:46 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:46 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 770.434759] erofs: read_super, device -> /dev/loop4 [ 770.439809] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 770.456626] squashfs: SQUASHFS error: unable to read fragment index table [ 770.471980] erofs: root inode @ nid 36 [ 770.481555] erofs: bogus i_mode (0) @ nid 36 07:25:46 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004074000000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:25:46 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:25:46 executing program 1: ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f00000000c0)=ANY=[@ANYBLOB]) bind$rxrpc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$udf(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x290c, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="01000200a400010054fbf001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0xc000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c16351c1d002a4c696e757820554446465300000000000000000000000405", 0xde, 0xc0c0}, {&(0x7f0000010500)="0000000000000000010000000000000000000000000000000000000000000000060002002d0001002caee8016100000002000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x7d, 0xc1e0}, {&(0x7f0000010600)="000000000000000000000000000000000000000900020000002a4f5354412055444620436f6d706c69616e74000000005001000000000000000200002000000000000000000000004000000001000000002a4c696e757820554446465300000000000000000000000405", 0x6a, 0xc2c0}, {&(0x7f0000010700)="00000000000000000000000000000000004000008000000002400000002a554446205370617261626c6520506172746974696f6e5001040500000000010000002000020038010000a0000000e0070000000000000000000000000000000000000500020055000100c535f001620000000500000001000000002b4e53523032000000000000000000000000000000000000000000000000000002", 0x9a, 0xc3a0}, {&(0x7f0000010800)="0000000000000000000000000000000000000000000000000300000020050000a0020000002a4c696e757820554446465300000000000000000000000405", 0x3e, 0xc4a0}, {&(0x7f0000011100)="02000200fd0001008f77f00100010000004000006000000000400000c007", 0x1e, 0x20000}, {&(0x7f0000011200)="07010200b3000100204840000000000000000000040000000100000100000000000000002800000000340040060000000012004037000000003e004041000000003e004061000000003e044081", 0x4d, 0xa4000}, {&(0x7f0000011a00)="0001020098000100e59ef001200000007810e4070913142c16351c1d0300030001000000010000000000000000000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x79, 0xa8000}, {&(0x7f0000011b00)="00000000000000000000000000000009004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446000000000000000000000000000000000000000000000908436f707972696768740000000000000000000000000000000000000000000a084162737472616374000000000000000000000000000000000000000000000900020000400000000000000000000000002a4f5354412055444620436f6d706c69616e74000000005001", 0xda, 0xa80e0}, {&(0x7f0000012200)="05010200cd0001005381b0004000000000000000040000000100000400000000000001000000000000000000a53c00000200000000000000440100000000000001000000000000000010e4070913122c16351c1d0010e4070913122c17130e360010e4070913122c17130e360100000000000000000000000000000000000000002a4c696e757820554446465300000000000000000000000405000000000000000000000000000000000000100000004401000060", 0xb5, 0xac000}], 0x0, &(0x7f0000013300)=ANY=[]) r0 = open(0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x2, @perf_config_ext={0x3, 0x7f}, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/../file0\x00', 0x419e02, 0x0) pwritev(r1, &(0x7f00000006c0)=[{&(0x7f0000000780)="c3", 0x47fffe0}], 0x8, 0x400fa7f, 0x4) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) sendmmsg(r3, &(0x7f0000001700)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000019b17200"/26], 0x18, 0xe000}, 0x5}], 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, 0x0) sendmsg$NL80211_CMD_AUTHENTICATE(r2, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f00000003c0)="c0f800f3676820fbf247747ba458352f51e5b4c21512ee8984f961988b43043a88842f50997493fe4ee06403510ec8c80a7cef21891e981257943b7a2f69c1f13b357bbb98370c4da0c09276b0badeed07e9abaf71bd5bf168c8a2b7ae23669092cf383abb4b6bedd37d3e5350deb8593e2fec73375084f309c652f31dc9b3311070b84f0a88a64dae3c60eaab81cfe07e3af5dc71ab1c75292801284fc9430257b3fd05d7e24a302a524bbf337e8a8424fa0b8771dfa713744d8492e2b87c4d71d034a74a742cdaa21f", 0xca, 0x8820, 0x0, 0x0) close(0xffffffffffffffff) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x400002172, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f00000000c0)=ANY=[@ANYBLOB]) (async) bind$rxrpc(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$udf(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x290c, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="01000200a400010054fbf001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0xc000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c16351c1d002a4c696e757820554446465300000000000000000000000405", 0xde, 0xc0c0}, {&(0x7f0000010500)="0000000000000000010000000000000000000000000000000000000000000000060002002d0001002caee8016100000002000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x7d, 0xc1e0}, {&(0x7f0000010600)="000000000000000000000000000000000000000900020000002a4f5354412055444620436f6d706c69616e74000000005001000000000000000200002000000000000000000000004000000001000000002a4c696e757820554446465300000000000000000000000405", 0x6a, 0xc2c0}, {&(0x7f0000010700)="00000000000000000000000000000000004000008000000002400000002a554446205370617261626c6520506172746974696f6e5001040500000000010000002000020038010000a0000000e0070000000000000000000000000000000000000500020055000100c535f001620000000500000001000000002b4e53523032000000000000000000000000000000000000000000000000000002", 0x9a, 0xc3a0}, {&(0x7f0000010800)="0000000000000000000000000000000000000000000000000300000020050000a0020000002a4c696e757820554446465300000000000000000000000405", 0x3e, 0xc4a0}, {&(0x7f0000011100)="02000200fd0001008f77f00100010000004000006000000000400000c007", 0x1e, 0x20000}, {&(0x7f0000011200)="07010200b3000100204840000000000000000000040000000100000100000000000000002800000000340040060000000012004037000000003e004041000000003e004061000000003e044081", 0x4d, 0xa4000}, {&(0x7f0000011a00)="0001020098000100e59ef001200000007810e4070913142c16351c1d0300030001000000010000000000000000000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x79, 0xa8000}, {&(0x7f0000011b00)="00000000000000000000000000000009004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446000000000000000000000000000000000000000000000908436f707972696768740000000000000000000000000000000000000000000a084162737472616374000000000000000000000000000000000000000000000900020000400000000000000000000000002a4f5354412055444620436f6d706c69616e74000000005001", 0xda, 0xa80e0}, {&(0x7f0000012200)="05010200cd0001005381b0004000000000000000040000000100000400000000000001000000000000000000a53c00000200000000000000440100000000000001000000000000000010e4070913122c16351c1d0010e4070913122c17130e360010e4070913122c17130e360100000000000000000000000000000000000000002a4c696e757820554446465300000000000000000000000405000000000000000000000000000000000000100000004401000060", 0xb5, 0xac000}], 0x0, &(0x7f0000013300)=ANY=[]) (async) open(0x0, 0x101000, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x2, @perf_config_ext={0x3, 0x7f}, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) (async) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/../file0\x00', 0x419e02, 0x0) (async) pwritev(r1, &(0x7f00000006c0)=[{&(0x7f0000000780)="c3", 0x47fffe0}], 0x8, 0x400fa7f, 0x4) (async) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x0) (async) socket(0x2000000000000021, 0x2, 0x10000000000002) (async) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) (async) sendmmsg(r3, &(0x7f0000001700)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000019b17200"/26], 0x18, 0xe000}, 0x5}], 0x1, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, 0x0) (async) sendmsg$NL80211_CMD_AUTHENTICATE(r2, 0x0, 0x0) (async) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) (async) sendto(0xffffffffffffffff, &(0x7f00000003c0)="c0f800f3676820fbf247747ba458352f51e5b4c21512ee8984f961988b43043a88842f50997493fe4ee06403510ec8c80a7cef21891e981257943b7a2f69c1f13b357bbb98370c4da0c09276b0badeed07e9abaf71bd5bf168c8a2b7ae23669092cf383abb4b6bedd37d3e5350deb8593e2fec73375084f309c652f31dc9b3311070b84f0a88a64dae3c60eaab81cfe07e3af5dc71ab1c75292801284fc9430257b3fd05d7e24a302a524bbf337e8a8424fa0b8771dfa713744d8492e2b87c4d71d034a74a742cdaa21f", 0xca, 0x8820, 0x0, 0x0) (async) close(0xffffffffffffffff) (async) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) (async) mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x400002172, 0xffffffffffffffff, 0x0) (async) [ 770.599526] erofs: read_super, device -> /dev/loop5 [ 770.604936] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 770.618114] erofs: root inode @ nid 0 [ 770.622964] erofs: bogus i_mode (0) @ nid 0 07:25:46 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 770.688951] erofs: read_super, device -> /dev/loop2 [ 770.694259] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 770.702843] erofs: root inode @ nid 36 [ 770.707684] erofs: bogus i_mode (0) @ nid 36 07:25:46 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, 0x0) 07:25:46 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000e803000000000000000000000100"/63, 0x3f, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:46 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f00407a000000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 770.782333] squashfs: SQUASHFS error: unable to read fragment index table 07:25:46 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 770.837162] erofs: read_super, device -> /dev/loop4 [ 770.846890] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 770.867898] erofs: root inode @ nid 36 [ 770.888470] erofs: bogus i_mode (0) @ nid 36 07:25:46 executing program 1: ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f00000000c0)=ANY=[@ANYBLOB]) bind$rxrpc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$udf(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x290c, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="01000200a400010054fbf001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0xc000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c16351c1d002a4c696e757820554446465300000000000000000000000405", 0xde, 0xc0c0}, {&(0x7f0000010500)="0000000000000000010000000000000000000000000000000000000000000000060002002d0001002caee8016100000002000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x7d, 0xc1e0}, {&(0x7f0000010600)="000000000000000000000000000000000000000900020000002a4f5354412055444620436f6d706c69616e74000000005001000000000000000200002000000000000000000000004000000001000000002a4c696e757820554446465300000000000000000000000405", 0x6a, 0xc2c0}, {&(0x7f0000010700)="00000000000000000000000000000000004000008000000002400000002a554446205370617261626c6520506172746974696f6e5001040500000000010000002000020038010000a0000000e0070000000000000000000000000000000000000500020055000100c535f001620000000500000001000000002b4e53523032000000000000000000000000000000000000000000000000000002", 0x9a, 0xc3a0}, {&(0x7f0000010800)="0000000000000000000000000000000000000000000000000300000020050000a0020000002a4c696e757820554446465300000000000000000000000405", 0x3e, 0xc4a0}, {&(0x7f0000011100)="02000200fd0001008f77f00100010000004000006000000000400000c007", 0x1e, 0x20000}, {&(0x7f0000011200)="07010200b3000100204840000000000000000000040000000100000100000000000000002800000000340040060000000012004037000000003e004041000000003e004061000000003e044081", 0x4d, 0xa4000}, {&(0x7f0000011a00)="0001020098000100e59ef001200000007810e4070913142c16351c1d0300030001000000010000000000000000000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x79, 0xa8000}, {&(0x7f0000011b00)="00000000000000000000000000000009004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446000000000000000000000000000000000000000000000908436f707972696768740000000000000000000000000000000000000000000a084162737472616374000000000000000000000000000000000000000000000900020000400000000000000000000000002a4f5354412055444620436f6d706c69616e74000000005001", 0xda, 0xa80e0}, {&(0x7f0000012200)="05010200cd0001005381b0004000000000000000040000000100000400000000000001000000000000000000a53c00000200000000000000440100000000000001000000000000000010e4070913122c16351c1d0010e4070913122c17130e360010e4070913122c17130e360100000000000000000000000000000000000000002a4c696e757820554446465300000000000000000000000405000000000000000000000000000000000000100000004401000060", 0xb5, 0xac000}], 0x0, &(0x7f0000013300)=ANY=[]) r0 = open(0x0, 0x101000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x2, @perf_config_ext={0x3, 0x7f}, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/../file0\x00', 0x419e02, 0x0) pwritev(r1, &(0x7f00000006c0)=[{&(0x7f0000000780)="c3", 0x47fffe0}], 0x8, 0x400fa7f, 0x4) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) sendmmsg(r3, &(0x7f0000001700)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000019b17200"/26], 0x18, 0xe000}, 0x5}], 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, 0x0) sendmsg$NL80211_CMD_AUTHENTICATE(r2, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f00000003c0)="c0f800f3676820fbf247747ba458352f51e5b4c21512ee8984f961988b43043a88842f50997493fe4ee06403510ec8c80a7cef21891e981257943b7a2f69c1f13b357bbb98370c4da0c09276b0badeed07e9abaf71bd5bf168c8a2b7ae23669092cf383abb4b6bedd37d3e5350deb8593e2fec73375084f309c652f31dc9b3311070b84f0a88a64dae3c60eaab81cfe07e3af5dc71ab1c75292801284fc9430257b3fd05d7e24a302a524bbf337e8a8424fa0b8771dfa713744d8492e2b87c4d71d034a74a742cdaa21f", 0xca, 0x8820, 0x0, 0x0) close(0xffffffffffffffff) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x400002172, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f00000000c0)=ANY=[@ANYBLOB]) (async) bind$rxrpc(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$udf(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x290c, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000000040)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="01000200a400010054fbf001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0xc000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c16351c1d002a4c696e757820554446465300000000000000000000000405", 0xde, 0xc0c0}, {&(0x7f0000010500)="0000000000000000010000000000000000000000000000000000000000000000060002002d0001002caee8016100000002000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x7d, 0xc1e0}, {&(0x7f0000010600)="000000000000000000000000000000000000000900020000002a4f5354412055444620436f6d706c69616e74000000005001000000000000000200002000000000000000000000004000000001000000002a4c696e757820554446465300000000000000000000000405", 0x6a, 0xc2c0}, {&(0x7f0000010700)="00000000000000000000000000000000004000008000000002400000002a554446205370617261626c6520506172746974696f6e5001040500000000010000002000020038010000a0000000e0070000000000000000000000000000000000000500020055000100c535f001620000000500000001000000002b4e53523032000000000000000000000000000000000000000000000000000002", 0x9a, 0xc3a0}, {&(0x7f0000010800)="0000000000000000000000000000000000000000000000000300000020050000a0020000002a4c696e757820554446465300000000000000000000000405", 0x3e, 0xc4a0}, {&(0x7f0000011100)="02000200fd0001008f77f00100010000004000006000000000400000c007", 0x1e, 0x20000}, {&(0x7f0000011200)="07010200b3000100204840000000000000000000040000000100000100000000000000002800000000340040060000000012004037000000003e004041000000003e004061000000003e044081", 0x4d, 0xa4000}, {&(0x7f0000011a00)="0001020098000100e59ef001200000007810e4070913142c16351c1d0300030001000000010000000000000000000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x79, 0xa8000}, {&(0x7f0000011b00)="00000000000000000000000000000009004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446000000000000000000000000000000000000000000000908436f707972696768740000000000000000000000000000000000000000000a084162737472616374000000000000000000000000000000000000000000000900020000400000000000000000000000002a4f5354412055444620436f6d706c69616e74000000005001", 0xda, 0xa80e0}, {&(0x7f0000012200)="05010200cd0001005381b0004000000000000000040000000100000400000000000001000000000000000000a53c00000200000000000000440100000000000001000000000000000010e4070913122c16351c1d0010e4070913122c17130e360010e4070913122c17130e360100000000000000000000000000000000000000002a4c696e757820554446465300000000000000000000000405000000000000000000000000000000000000100000004401000060", 0xb5, 0xac000}], 0x0, &(0x7f0000013300)=ANY=[]) (async) open(0x0, 0x101000, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x2, @perf_config_ext={0x3, 0x7f}, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) (async) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/../file0\x00', 0x419e02, 0x0) (async) pwritev(r1, &(0x7f00000006c0)=[{&(0x7f0000000780)="c3", 0x47fffe0}], 0x8, 0x400fa7f, 0x4) (async) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x0) (async) socket(0x2000000000000021, 0x2, 0x10000000000002) (async) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) (async) sendmmsg(r3, &(0x7f0000001700)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000019b17200"/26], 0x18, 0xe000}, 0x5}], 0x1, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, 0x0) (async) sendmsg$NL80211_CMD_AUTHENTICATE(r2, 0x0, 0x0) (async) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) (async) sendto(0xffffffffffffffff, &(0x7f00000003c0)="c0f800f3676820fbf247747ba458352f51e5b4c21512ee8984f961988b43043a88842f50997493fe4ee06403510ec8c80a7cef21891e981257943b7a2f69c1f13b357bbb98370c4da0c09276b0badeed07e9abaf71bd5bf168c8a2b7ae23669092cf383abb4b6bedd37d3e5350deb8593e2fec73375084f309c652f31dc9b3311070b84f0a88a64dae3c60eaab81cfe07e3af5dc71ab1c75292801284fc9430257b3fd05d7e24a302a524bbf337e8a8424fa0b8771dfa713744d8492e2b87c4d71d034a74a742cdaa21f", 0xca, 0x8820, 0x0, 0x0) (async) close(0xffffffffffffffff) (async) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) (async) mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x400002172, 0xffffffffffffffff, 0x0) (async) 07:25:46 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:46 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, 0x0) [ 771.034764] erofs: read_super, device -> /dev/loop2 [ 771.046163] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 771.066936] erofs: root inode @ nid 36 [ 771.074024] squashfs: SQUASHFS error: unable to read fragment index table 07:25:46 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000030000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 771.083691] erofs: mounted on /dev/loop2 with opts: noacl. 07:25:46 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 771.130353] erofs: unmounted for /dev/loop2 07:25:46 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:25:46 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, 0x0) [ 771.180704] erofs: read_super, device -> /dev/loop4 [ 771.199158] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 771.236240] erofs: root inode @ nid 36 [ 771.250324] erofs: mounted on /dev/loop4 with opts: noacl. [ 771.264060] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2020/09/19 18:44 (1000) 07:25:47 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:47 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004082030000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 771.345500] erofs: read_super, device -> /dev/loop2 [ 771.353468] squashfs: SQUASHFS error: unable to read fragment index table [ 771.369874] erofs: unmounted for /dev/loop4 [ 771.378992] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, 07:25:47 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 771.405754] erofs: root inode @ nid 36 [ 771.409927] erofs: bogus i_mode (0) @ nid 36 07:25:47 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}]}) 07:25:47 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:25:47 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 771.695688] erofs: read_super, device -> /dev/loop4 [ 771.700909] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 771.709634] erofs: root inode @ nid 36 [ 771.713984] erofs: bogus i_mode (0) @ nid 36 07:25:47 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f00408f030000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 771.800926] erofs: read_super, device -> /dev/loop1 [ 771.804801] erofs: read_super, device -> /dev/loop2 [ 771.806417] erofs: read_super, device -> /dev/loop5 [ 771.811044] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 771.822745] erofs: root inode @ nid 36 [ 771.830054] squashfs: SQUASHFS error: unable to read fragment index table [ 771.836156] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, 07:25:47 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:47 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 771.850320] erofs: options -> noacl,noacl,nouser_xattr,noacl, [ 771.861580] erofs: root inode @ nid 36 [ 771.866429] erofs: bogus i_mode (0) @ nid 36 [ 771.869664] erofs: root inode @ nid 0 [ 771.877283] erofs: mounted on /dev/loop1 with opts: noacl. [ 771.888395] erofs: bogus i_mode (0) @ nid 0 07:25:47 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004090030000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:25:47 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:47 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 772.019210] erofs: unmounted for /dev/loop1 [ 772.032875] erofs: read_super, device -> /dev/loop4 [ 772.040295] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, 07:25:47 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}]}) [ 772.069064] erofs: root inode @ nid 36 [ 772.080885] erofs: bogus i_mode (0) @ nid 36 [ 772.100504] squashfs: SQUASHFS error: unable to read fragment index table [ 772.151686] erofs: read_super, device -> /dev/loop2 [ 772.158135] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 772.168765] erofs: root inode @ nid 36 [ 772.173474] erofs: bogus i_mode (0) @ nid 36 07:25:47 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:25:47 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:48 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004091030000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 772.211993] erofs: read_super, device -> /dev/loop1 [ 772.230057] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, 07:25:48 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 772.277988] erofs: root inode @ nid 36 [ 772.310951] erofs: mounted on /dev/loop1 with opts: noacl. [ 772.331277] erofs: read_super, device -> /dev/loop5 [ 772.336639] squashfs: SQUASHFS error: unable to read fragment index table [ 772.348476] erofs: options -> noacl,noacl,nouser_xattr,noacl, 07:25:48 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 772.367011] erofs: read_super, device -> /dev/loop4 [ 772.369383] erofs: root inode @ nid 0 [ 772.384211] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 772.390619] erofs: bogus i_mode (0) @ nid 0 [ 772.398998] erofs: root inode @ nid 36 [ 772.403270] erofs: unmounted for /dev/loop1 [ 772.410043] erofs: bogus i_mode (0) @ nid 36 07:25:48 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}]}) 07:25:48 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ff", 0x11, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 772.478475] erofs: read_super, device -> /dev/loop2 [ 772.484265] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 772.496241] erofs: root inode @ nid 36 [ 772.504981] erofs: mounted on /dev/loop2 with opts: noacl. 07:25:48 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004092030000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:25:48 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:25:48 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 772.598688] erofs: read_super, device -> /dev/loop1 [ 772.608375] erofs: unmounted for /dev/loop2 [ 772.613974] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 772.656454] erofs: root inode @ nid 36 [ 772.678300] erofs: mounted on /dev/loop1 with opts: noacl. 07:25:48 executing program 1: syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 772.734966] erofs: read_super, device -> /dev/loop4 [ 772.746920] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 772.767242] erofs: root inode @ nid 36 [ 772.771544] erofs: mounted on /dev/loop4 with opts: noacl. [ 772.779741] erofs: unmounted for /dev/loop1 07:25:48 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004093030000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 772.787348] squashfs: SQUASHFS error: unable to read fragment index table [ 772.788172] erofs: read_super, device -> /dev/loop5 [ 772.803330] erofs: options -> noacl,noacl,nouser_xattr, [ 772.818318] erofs: read_super, device -> /dev/loop2 07:25:48 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="0500", 0x2, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:48 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 772.849537] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 772.857056] erofs: unmounted for /dev/loop4 [ 772.871193] erofs: root inode @ nid 0 [ 772.873311] erofs: root inode @ nid 36 [ 772.881102] erofs: bogus i_mode (0) @ nid 36 [ 772.881903] erofs: bogus i_mode (0) @ nid 0 07:25:48 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}]}) 07:25:48 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:48 executing program 1: syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:48 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004094030000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 773.088268] squashfs: SQUASHFS error: unable to read fragment index table [ 773.217686] erofs: read_super, device -> /dev/loop5 [ 773.222737] erofs: options -> noacl,noacl,nouser_xattr, [ 773.230135] erofs: root inode @ nid 0 [ 773.234079] erofs: bogus i_mode (0) @ nid 0 [ 773.240237] erofs: read_super, device -> /dev/loop4 07:25:49 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {@noacl}]}) 07:25:49 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 773.263947] erofs: read_super, device -> /dev/loop2 [ 773.272650] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 773.291970] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 773.304111] erofs: root inode @ nid 36 [ 773.311619] erofs: root inode @ nid 36 07:25:49 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="0500", 0x2, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 773.332853] erofs: bogus i_mode (0) @ nid 36 [ 773.342305] erofs: bogus i_mode (0) @ nid 36 07:25:49 executing program 1: syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:49 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:49 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004095030000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 773.535740] erofs: read_super, device -> /dev/loop5 [ 773.542312] squashfs: SQUASHFS error: unable to read fragment index table [ 773.550721] erofs: read_super, device -> /dev/loop4 [ 773.553977] erofs: options -> noacl,noacl, [ 773.557039] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 773.575721] erofs: root inode @ nid 0 07:25:49 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 773.593834] erofs: root inode @ nid 36 [ 773.598392] erofs: bogus i_mode (0) @ nid 0 [ 773.608475] erofs: bogus i_mode (0) @ nid 36 [ 773.683881] erofs: read_super, device -> /dev/loop2 [ 773.689785] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 773.700299] erofs: root inode @ nid 36 [ 773.709537] erofs: bogus i_mode (0) @ nid 36 07:25:49 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:25:49 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), 0x0, 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 773.836776] squashfs: SQUASHFS error: unable to read fragment index table 07:25:49 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004096030000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:25:49 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="0500", 0x2, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:49 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:25:49 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ff", 0x11, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:49 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), 0x0, 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 774.028440] erofs: read_super, device -> /dev/loop5 [ 774.049019] erofs: options -> noacl, [ 774.068229] erofs: root inode @ nid 0 [ 774.073280] erofs: bogus i_mode (0) @ nid 0 [ 774.086455] squashfs: SQUASHFS error: unable to read fragment index table 07:25:49 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004097030000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 774.155273] erofs: read_super, device -> /dev/loop4 [ 774.166804] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 774.179495] erofs: root inode @ nid 36 [ 774.183680] erofs: bogus i_mode (0) @ nid 36 [ 774.196146] erofs: read_super, device -> /dev/loop2 07:25:49 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 07:25:50 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 774.201369] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 774.209152] erofs: root inode @ nid 36 [ 774.213367] erofs: mounted on /dev/loop2 with opts: noacl. 07:25:50 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400", 0xa, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:50 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), 0x0, 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:50 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="0500", 0x2, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 774.358867] erofs: unmounted for /dev/loop2 [ 774.426926] erofs: read_super, device -> /dev/loop5 07:25:50 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:50 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004098030000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 774.449344] erofs: options -> [ 774.460329] erofs: read_super, device -> /dev/loop4 [ 774.461715] erofs: root inode @ nid 0 [ 774.472747] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 774.482086] erofs: bogus i_mode (0) @ nid 0 [ 774.484643] erofs: root inode @ nid 36 [ 774.490378] erofs: mounted on /dev/loop4 with opts: noacl. 07:25:50 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="050000", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 774.565333] erofs: read_super, device -> /dev/loop2 [ 774.565878] erofs: unmounted for /dev/loop4 [ 774.570467] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 774.577718] squashfs: SQUASHFS error: unable to read fragment index table [ 774.584187] erofs: root inode @ nid 36 [ 774.611253] erofs: bogus i_mode (0) @ nid 36 07:25:50 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 07:25:50 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:50 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="0500", 0x2, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:50 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000060000006000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) 07:25:50 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 774.775302] erofs: read_super, device -> /dev/loop4 [ 774.780532] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 774.788886] erofs: read_super, device -> /dev/loop5 [ 774.793084] squashfs: SQUASHFS error: unable to read fragment index table [ 774.793917] erofs: options -> [ 774.801420] erofs: root inode @ nid 36 [ 774.816523] erofs: bogus i_mode (0) @ nid 36 07:25:50 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004099030000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:25:50 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000068000006000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) 07:25:50 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 774.823917] erofs: read_super, device -> /dev/loop2 [ 774.844600] erofs: root inode @ nid 0 [ 774.845711] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 774.856980] erofs: root inode @ nid 36 [ 774.857616] erofs: bogus i_mode (0) @ nid 0 [ 774.861143] erofs: bogus i_mode (0) @ nid 36 07:25:50 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="0500", 0x2, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:50 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)) 07:25:50 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="050000", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:50 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f00409a030000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 775.064585] erofs: read_super, device -> /dev/loop1 [ 775.069642] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 775.077863] erofs: cannot read erofs superblock 07:25:50 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000050000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 775.105859] erofs: read_super, device -> /dev/loop4 [ 775.110911] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 775.124953] erofs: read_super, device -> /dev/loop5 [ 775.130072] erofs: root inode @ nid 36 [ 775.130088] erofs: options -> [ 775.137488] erofs: bogus i_mode (0) @ nid 36 [ 775.138900] squashfs: SQUASHFS error: unable to read fragment index table 07:25:50 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:50 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="050000", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 775.175306] erofs: root inode @ nid 0 [ 775.185428] erofs: bogus i_mode (0) @ nid 0 [ 775.196120] erofs: read_super, device -> /dev/loop2 [ 775.201436] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 775.220187] erofs: root inode @ nid 36 [ 775.229776] erofs: bogus i_mode (0) @ nid 36 07:25:51 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:25:51 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000060000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:25:51 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400", 0xa, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 775.387530] erofs: read_super, device -> /dev/loop1 [ 775.390045] erofs: read_super, device -> /dev/loop4 [ 775.419995] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 775.433132] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, 07:25:51 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05", 0x1, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:51 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 775.462902] erofs: cannot read erofs superblock [ 775.467334] erofs: root inode @ nid 36 [ 775.490565] erofs: bogus i_mode (0) @ nid 36 07:25:51 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000070000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 775.605517] erofs: read_super, device -> /dev/loop2 [ 775.610884] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 775.622752] erofs: root inode @ nid 36 [ 775.627450] erofs: mounted on /dev/loop2 with opts: noacl. [ 775.629568] squashfs: SQUASHFS error: unable to read fragment index table 07:25:51 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100", 0x7, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:51 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="050000", 0x3, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 775.657476] erofs: read_super, device -> /dev/loop1 [ 775.662786] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 775.669758] erofs: cannot read erofs superblock [ 775.690894] erofs: read_super, device -> /dev/loop5 07:25:51 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:25:51 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}, {0x0}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 775.712782] erofs: unmounted for /dev/loop2 [ 775.715083] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 775.744638] erofs: root inode @ nid 36 [ 775.752094] erofs: bogus i_mode (0) @ nid 36 [ 775.805608] erofs: read_super, device -> /dev/loop4 [ 775.810815] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 775.823534] erofs: root inode @ nid 36 [ 775.828318] erofs: mounted on /dev/loop4 with opts: noacl. 07:25:51 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000090000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:25:51 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000", 0x4, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 775.861632] erofs: read_super, device -> /dev/loop2 [ 775.874789] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 775.881901] erofs: root inode @ nid 36 [ 775.886357] erofs: bogus i_mode (0) @ nid 36 07:25:51 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 1) [ 775.911056] erofs: unmounted for /dev/loop4 07:25:51 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="050000", 0x3, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 775.959967] squashfs: SQUASHFS error: unable to read fragment index table [ 775.991161] erofs: read_super, device -> /dev/loop1 [ 775.997024] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 776.011273] erofs: cannot read erofs superblock [ 776.021941] FAULT_INJECTION: forcing a failure. [ 776.021941] name failslab, interval 1, probability 0, space 0, times 0 [ 776.043562] CPU: 1 PID: 26920 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 776.051467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 776.060822] Call Trace: [ 776.063417] dump_stack+0x1fc/0x2ef [ 776.067063] should_fail.cold+0xa/0xf [ 776.070878] ? setup_fault_attr+0x200/0x200 [ 776.075209] ? lock_acquire+0x170/0x3c0 [ 776.079198] __should_failslab+0x115/0x180 [ 776.083444] should_failslab+0x5/0x10 [ 776.087250] __kmalloc+0x2ab/0x3c0 [ 776.090775] ? __se_sys_memfd_create+0xf8/0x440 [ 776.095443] __se_sys_memfd_create+0xf8/0x440 [ 776.099944] ? memfd_file_seals_ptr+0x150/0x150 [ 776.104609] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 776.109974] ? trace_hardirqs_off_caller+0x6e/0x210 [ 776.114982] ? do_syscall_64+0x21/0x620 [ 776.118957] do_syscall_64+0xf9/0x620 [ 776.122773] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 776.127963] RIP: 0033:0x7fe048272049 [ 776.131679] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 776.150653] RSP: 002b:00007fe046be6f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 07:25:51 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:25:51 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 2) [ 776.158438] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fe048272049 [ 776.165689] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fe0482cb1e0 [ 776.173135] RBP: 0000000000000002 R08: 0000000000001000 R09: 00007fe046be71d0 [ 776.180387] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 776.187642] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 07:25:52 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}, {0x0}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:52 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040000a0000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 776.251804] erofs: read_super, device -> /dev/loop2 [ 776.254653] erofs: read_super, device -> /dev/loop4 [ 776.274302] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 776.274568] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 776.303572] erofs: root inode @ nid 36 [ 776.318392] erofs: bogus i_mode (0) @ nid 36 07:25:52 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000", 0x4, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 776.375446] erofs: root inode @ nid 36 [ 776.379592] erofs: bogus i_mode (0) @ nid 36 [ 776.390932] FAULT_INJECTION: forcing a failure. [ 776.390932] name failslab, interval 1, probability 0, space 0, times 0 [ 776.402715] CPU: 1 PID: 26943 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 776.410599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 776.419934] Call Trace: [ 776.422512] dump_stack+0x1fc/0x2ef [ 776.426135] should_fail.cold+0xa/0xf [ 776.429923] ? setup_fault_attr+0x200/0x200 [ 776.434226] ? lock_acquire+0x170/0x3c0 [ 776.438186] __should_failslab+0x115/0x180 [ 776.442402] should_failslab+0x5/0x10 [ 776.446184] kmem_cache_alloc+0x277/0x370 [ 776.450314] ? shmem_destroy_callback+0xb0/0xb0 [ 776.454966] shmem_alloc_inode+0x18/0x40 [ 776.459009] ? shmem_destroy_callback+0xb0/0xb0 [ 776.463658] alloc_inode+0x5d/0x180 [ 776.467265] new_inode+0x1d/0xf0 [ 776.470616] shmem_get_inode+0x96/0x8d0 [ 776.474581] __shmem_file_setup.part.0+0x7a/0x2b0 [ 776.479417] shmem_file_setup+0x61/0x90 [ 776.483379] __se_sys_memfd_create+0x26b/0x440 [ 776.487944] ? memfd_file_seals_ptr+0x150/0x150 [ 776.492595] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 776.497953] ? trace_hardirqs_off_caller+0x6e/0x210 [ 776.502957] ? do_syscall_64+0x21/0x620 [ 776.506914] do_syscall_64+0xf9/0x620 [ 776.510701] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 776.515870] RIP: 0033:0x7fe048272049 [ 776.519567] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 776.538465] RSP: 002b:00007fe046be6f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 776.546158] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fe048272049 [ 776.553410] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fe0482cb1e0 [ 776.560661] RBP: 0000000000000002 R08: 0000000000001000 R09: 00007fe046be71d0 [ 776.567916] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 07:25:52 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="050000", 0x3, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:52 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 3) [ 776.575169] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 [ 776.601001] squashfs: SQUASHFS error: unable to read fragment index table 07:25:52 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040001f0000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 776.656308] erofs: read_super, device -> /dev/loop1 [ 776.661510] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 776.669517] erofs: cannot read erofs superblock [ 776.744598] FAULT_INJECTION: forcing a failure. [ 776.744598] name failslab, interval 1, probability 0, space 0, times 0 [ 776.756229] CPU: 0 PID: 26958 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 776.764123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 776.773482] Call Trace: [ 776.776081] dump_stack+0x1fc/0x2ef [ 776.779722] should_fail.cold+0xa/0xf [ 776.783540] ? setup_fault_attr+0x200/0x200 [ 776.787866] ? lock_acquire+0x170/0x3c0 [ 776.791855] __should_failslab+0x115/0x180 [ 776.796105] should_failslab+0x5/0x10 [ 776.799949] kmem_cache_alloc+0x277/0x370 [ 776.801701] erofs: read_super, device -> /dev/loop2 [ 776.804107] __d_alloc+0x2b/0xa10 [ 776.804130] d_alloc_pseudo+0x19/0x70 [ 776.804147] alloc_file_pseudo+0xc6/0x250 [ 776.804164] ? alloc_file+0x4d0/0x4d0 [ 776.804179] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 776.804196] ? shmem_get_inode+0x44c/0x8d0 [ 776.804215] __shmem_file_setup.part.0+0x102/0x2b0 [ 776.804234] shmem_file_setup+0x61/0x90 [ 776.804250] __se_sys_memfd_create+0x26b/0x440 [ 776.804264] ? memfd_file_seals_ptr+0x150/0x150 [ 776.804279] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 776.804297] ? trace_hardirqs_off_caller+0x6e/0x210 [ 776.815592] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 776.816523] ? do_syscall_64+0x21/0x620 [ 776.816542] do_syscall_64+0xf9/0x620 [ 776.816563] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 776.816575] RIP: 0033:0x7fe048272049 07:25:52 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 4) [ 776.816589] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 776.816596] RSP: 002b:00007fe046be6f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 776.821177] erofs: root inode @ nid 36 [ 776.824527] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fe048272049 [ 776.824535] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fe0482cb1e0 [ 776.824544] RBP: 0000000000000002 R08: 0000000000001000 R09: 00007fe046be71d0 [ 776.824552] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 776.824560] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 [ 776.955284] erofs: bogus i_mode (0) @ nid 36 [ 776.971198] erofs: read_super, device -> /dev/loop4 07:25:52 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000200000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:25:52 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000ffffffff000000005cf90000535f0000", 0x20, 0x480}, {0x0}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:52 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:25:52 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100", 0x7, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 776.991077] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 777.012512] erofs: root inode @ nid 36 [ 777.022178] erofs: bogus i_mode (0) @ nid 36 [ 777.076873] FAULT_INJECTION: forcing a failure. [ 777.076873] name failslab, interval 1, probability 0, space 0, times 0 [ 777.092808] CPU: 1 PID: 26977 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 777.100714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 777.110070] Call Trace: [ 777.112774] dump_stack+0x1fc/0x2ef [ 777.116410] should_fail.cold+0xa/0xf [ 777.120227] ? setup_fault_attr+0x200/0x200 [ 777.124559] ? lock_acquire+0x170/0x3c0 [ 777.128547] __should_failslab+0x115/0x180 [ 777.132781] should_failslab+0x5/0x10 [ 777.136564] kmem_cache_alloc+0x277/0x370 [ 777.140705] __alloc_file+0x21/0x340 [ 777.144433] alloc_empty_file+0x6d/0x170 [ 777.148480] alloc_file+0x5e/0x4d0 [ 777.152009] alloc_file_pseudo+0x165/0x250 [ 777.156227] ? alloc_file+0x4d0/0x4d0 [ 777.160012] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 777.165626] ? shmem_get_inode+0x44c/0x8d0 [ 777.169874] __shmem_file_setup.part.0+0x102/0x2b0 [ 777.174880] shmem_file_setup+0x61/0x90 [ 777.178840] __se_sys_memfd_create+0x26b/0x440 [ 777.183414] ? memfd_file_seals_ptr+0x150/0x150 [ 777.188068] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 777.193419] ? trace_hardirqs_off_caller+0x6e/0x210 [ 777.198425] ? do_syscall_64+0x21/0x620 [ 777.202389] do_syscall_64+0xf9/0x620 [ 777.206186] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 777.211356] RIP: 0033:0x7fe048272049 [ 777.215058] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 777.233948] RSP: 002b:00007fe046be6f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 777.241638] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fe048272049 [ 777.248892] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fe0482cb1e0 [ 777.256148] RBP: 0000000000000002 R08: 0000000000001000 R09: 00007fe046be71d0 [ 777.263409] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 777.270666] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 07:25:53 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 5) 07:25:53 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000", 0x4, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 777.317820] erofs: read_super, device -> /dev/loop1 [ 777.323173] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 777.324484] squashfs: SQUASHFS error: unable to read fragment index table [ 777.342774] erofs: cannot read erofs superblock [ 777.364995] erofs: read_super, device -> /dev/loop2 [ 777.370330] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 777.383119] erofs: root inode @ nid 36 [ 777.388226] erofs: mounted on /dev/loop2 with opts: noacl. [ 777.392647] FAULT_INJECTION: forcing a failure. [ 777.392647] name failslab, interval 1, probability 0, space 0, times 0 [ 777.408754] CPU: 1 PID: 26998 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 777.416633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 777.425975] Call Trace: [ 777.428556] dump_stack+0x1fc/0x2ef [ 777.432179] should_fail.cold+0xa/0xf [ 777.435973] ? setup_fault_attr+0x200/0x200 [ 777.440283] ? lock_acquire+0x170/0x3c0 [ 777.444258] __should_failslab+0x115/0x180 [ 777.448486] should_failslab+0x5/0x10 [ 777.452278] kmem_cache_alloc_trace+0x284/0x380 [ 777.456940] apparmor_file_alloc_security+0x394/0xad0 [ 777.462120] ? apparmor_file_receive+0x160/0x160 [ 777.466866] ? __alloc_file+0x21/0x340 [ 777.470748] security_file_alloc+0x40/0x90 [ 777.474973] __alloc_file+0xd8/0x340 [ 777.478678] alloc_empty_file+0x6d/0x170 [ 777.482727] alloc_file+0x5e/0x4d0 [ 777.486266] alloc_file_pseudo+0x165/0x250 [ 777.490490] ? alloc_file+0x4d0/0x4d0 [ 777.494291] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 777.499905] ? shmem_get_inode+0x44c/0x8d0 [ 777.504155] __shmem_file_setup.part.0+0x102/0x2b0 [ 777.509078] shmem_file_setup+0x61/0x90 [ 777.513039] __se_sys_memfd_create+0x26b/0x440 [ 777.517608] ? memfd_file_seals_ptr+0x150/0x150 [ 777.522265] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 777.527615] ? trace_hardirqs_off_caller+0x6e/0x210 [ 777.532618] ? do_syscall_64+0x21/0x620 [ 777.536585] do_syscall_64+0xf9/0x620 [ 777.540381] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 777.545557] RIP: 0033:0x7fe048272049 [ 777.549260] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:25:53 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 6) [ 777.568145] RSP: 002b:00007fe046be6f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 777.575842] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fe048272049 [ 777.583097] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fe0482cb1e0 [ 777.590350] RBP: 0000000000000002 R08: 0000000000001000 R09: 00007fe046be71d0 [ 777.597611] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 777.604864] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 07:25:53 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000230000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:25:53 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:25:53 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:53 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000", 0x4, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 777.678361] erofs: read_super, device -> /dev/loop4 [ 777.692360] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 777.729962] erofs: unmounted for /dev/loop2 [ 777.738263] erofs: root inode @ nid 36 [ 777.758324] erofs: bogus i_mode (0) @ nid 36 [ 777.768529] FAULT_INJECTION: forcing a failure. [ 777.768529] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 777.781611] CPU: 1 PID: 27011 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 777.789503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 777.798856] Call Trace: [ 777.801454] dump_stack+0x1fc/0x2ef [ 777.805095] should_fail.cold+0xa/0xf [ 777.808905] ? lock_acquire+0x170/0x3c0 [ 777.812884] ? setup_fault_attr+0x200/0x200 [ 777.817209] __alloc_pages_nodemask+0x239/0x2890 [ 777.821953] ? __lock_acquire+0x6de/0x3ff0 [ 777.826173] ? static_obj+0x50/0x50 [ 777.829785] ? __lock_acquire+0x6de/0x3ff0 [ 777.834013] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 777.838843] ? __lock_acquire+0x6de/0x3ff0 [ 777.843067] ? mark_held_locks+0xf0/0xf0 [ 777.847111] ? unwind_next_frame+0xeee/0x1400 [ 777.851588] ? mark_held_locks+0xf0/0xf0 [ 777.855633] ? deref_stack_reg+0x134/0x1d0 [ 777.859849] ? get_reg+0x176/0x1f0 [ 777.863373] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 777.869249] alloc_pages_vma+0xf2/0x780 [ 777.873211] shmem_alloc_page+0x11c/0x1f0 [ 777.877342] ? shmem_swapin+0x220/0x220 [ 777.881314] ? percpu_counter_add_batch+0x126/0x180 [ 777.886332] ? __vm_enough_memory+0x316/0x650 [ 777.890811] shmem_alloc_and_acct_page+0x15a/0x850 [ 777.895731] shmem_getpage_gfp+0x4e9/0x37f0 [ 777.900056] ? shmem_alloc_and_acct_page+0x850/0x850 [ 777.905173] ? mark_held_locks+0xa6/0xf0 [ 777.909221] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 777.914392] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 777.919606] shmem_write_begin+0xff/0x1e0 [ 777.923770] generic_perform_write+0x1f8/0x4d0 [ 777.928339] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 777.932991] ? current_time+0x1c0/0x1c0 [ 777.936949] ? lock_acquire+0x170/0x3c0 [ 777.940917] __generic_file_write_iter+0x24b/0x610 [ 777.945840] generic_file_write_iter+0x3f8/0x730 [ 777.950589] __vfs_write+0x51b/0x770 [ 777.954292] ? kernel_read+0x110/0x110 [ 777.958206] ? check_preemption_disabled+0x41/0x280 [ 777.963238] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 777.968254] vfs_write+0x1f3/0x540 [ 777.971797] __x64_sys_pwrite64+0x1f7/0x250 [ 777.976137] ? ksys_pwrite64+0x1a0/0x1a0 [ 777.980196] ? trace_hardirqs_off_caller+0x6e/0x210 [ 777.985194] ? do_syscall_64+0x21/0x620 [ 777.989152] do_syscall_64+0xf9/0x620 [ 777.992938] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 777.998117] RIP: 0033:0x7fe048225017 [ 778.001824] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 778.020723] RSP: 002b:00007fe046be6f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 778.028414] RAX: ffffffffffffffda RBX: 00007fe0482bb9c8 RCX: 00007fe048225017 [ 778.035666] RDX: 000000000000000d RSI: 0000000020010000 RDI: 0000000000000004 [ 778.042918] RBP: 0000000000000002 R08: 0000000000000000 R09: 00007fe046be71d0 [ 778.050234] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 778.057500] R13: 0000000000000004 R14: 0000000020000180 R15: 0000000000000000 07:25:53 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f00408a260000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 778.135679] erofs: read_super, device -> /dev/loop1 [ 778.140720] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 778.158463] erofs: read_super, device -> /dev/loop2 [ 778.161573] erofs: read_super, device -> /dev/loop5 [ 778.163511] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 778.173903] erofs: root inode @ nid 36 07:25:53 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:54 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 778.182773] squashfs: SQUASHFS error: unable to read fragment index table [ 778.188021] erofs: options -> noacl, [ 778.204943] erofs: cannot find valid erofs superblock [ 778.213648] erofs: bogus i_mode (0) @ nid 36 [ 778.226334] erofs: root inode @ nid 36 [ 778.231247] erofs: bogus i_mode (0) @ nid 36 07:25:54 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 7) 07:25:54 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 778.319445] erofs: read_super, device -> /dev/loop4 [ 778.325061] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 778.332381] erofs: root inode @ nid 36 [ 778.337016] erofs: mounted on /dev/loop4 with opts: noacl. 07:25:54 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:54 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000", 0x4, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 778.400082] erofs: unmounted for /dev/loop4 [ 778.439103] FAULT_INJECTION: forcing a failure. [ 778.439103] name failslab, interval 1, probability 0, space 0, times 0 [ 778.459240] CPU: 1 PID: 27050 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 778.467142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 778.476497] Call Trace: [ 778.479104] dump_stack+0x1fc/0x2ef [ 778.482750] should_fail.cold+0xa/0xf [ 778.486567] ? setup_fault_attr+0x200/0x200 [ 778.490900] ? lock_acquire+0x170/0x3c0 [ 778.494889] __should_failslab+0x115/0x180 [ 778.499137] should_failslab+0x5/0x10 [ 778.499943] squashfs: SQUASHFS error: unable to read fragment index table [ 778.502946] kmem_cache_alloc+0x277/0x370 [ 778.514010] getname_flags+0xce/0x590 [ 778.517818] do_sys_open+0x26c/0x520 [ 778.521549] ? filp_open+0x70/0x70 [ 778.525108] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 778.530489] ? trace_hardirqs_off_caller+0x6e/0x210 [ 778.535516] ? do_syscall_64+0x21/0x620 [ 778.539504] do_syscall_64+0xf9/0x620 [ 778.543322] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 778.548501] erofs: read_super, device -> /dev/loop2 [ 778.548512] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 778.553519] RIP: 0033:0x7fe048224f64 [ 778.564049] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 778.564159] erofs: root inode @ nid 36 07:25:54 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 8) 07:25:54 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040b1260000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 778.582941] RSP: 002b:00007fe046be6eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 778.582955] RAX: ffffffffffffffda RBX: 00007fe0482bb9c8 RCX: 00007fe048224f64 [ 778.582965] RDX: 0000000000000002 RSI: 00007fe046be6fe0 RDI: 00000000ffffff9c [ 778.582974] RBP: 00007fe046be6fe0 R08: 0000000000000000 R09: 00007fe046be71d0 [ 778.582982] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 778.582989] R13: 0000000000000004 R14: 00000000200001b0 R15: 0000000000000002 [ 778.631995] erofs: bogus i_mode (0) @ nid 36 07:25:54 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 778.641889] erofs: read_super, device -> /dev/loop1 [ 778.651333] erofs: read_super, device -> /dev/loop4 [ 778.662043] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 778.669036] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 778.686307] erofs: root inode @ nid 36 [ 778.693045] erofs: root inode @ nid 36 [ 778.703139] erofs: bogus i_mode (0) @ nid 36 [ 778.706220] FAULT_INJECTION: forcing a failure. [ 778.706220] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 778.719355] CPU: 0 PID: 27070 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 778.727229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 778.736568] Call Trace: [ 778.739148] dump_stack+0x1fc/0x2ef [ 778.742765] should_fail.cold+0xa/0xf [ 778.746557] ? setup_fault_attr+0x200/0x200 [ 778.750882] ? do_writepages+0x290/0x290 [ 778.754941] ? unlock_page+0x13d/0x230 [ 778.758825] __alloc_pages_nodemask+0x239/0x2890 [ 778.763575] ? lock_downgrade+0x720/0x720 [ 778.767711] ? check_preemption_disabled+0x41/0x280 [ 778.772742] ? __lock_acquire+0x6de/0x3ff0 [ 778.776985] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 778.781822] ? lock_downgrade+0x720/0x720 [ 778.785959] ? lock_acquire+0x170/0x3c0 [ 778.789926] ? up_write+0x18/0x150 [ 778.793451] ? generic_file_write_iter+0x381/0x730 [ 778.798369] ? iov_iter_init+0xb8/0x1d0 [ 778.802338] cache_grow_begin+0xa4/0x8a0 [ 778.806394] ? setup_fault_attr+0x200/0x200 [ 778.810711] ? lock_acquire+0x170/0x3c0 [ 778.814688] cache_alloc_refill+0x273/0x340 [ 778.819009] kmem_cache_alloc+0x346/0x370 [ 778.823156] getname_flags+0xce/0x590 [ 778.826949] do_sys_open+0x26c/0x520 [ 778.830653] ? filp_open+0x70/0x70 [ 778.834188] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 778.839544] ? trace_hardirqs_off_caller+0x6e/0x210 [ 778.844549] ? do_syscall_64+0x21/0x620 [ 778.848859] do_syscall_64+0xf9/0x620 [ 778.852651] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 778.857828] RIP: 0033:0x7fe048224f64 [ 778.861539] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 778.880425] RSP: 002b:00007fe046be6eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 07:25:54 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000", 0x4, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 778.888126] RAX: ffffffffffffffda RBX: 00007fe0482bb9c8 RCX: 00007fe048224f64 [ 778.895380] RDX: 0000000000000002 RSI: 00007fe046be6fe0 RDI: 00000000ffffff9c [ 778.902651] RBP: 00007fe046be6fe0 R08: 0000000000000000 R09: 00007fe046be71d0 [ 778.909939] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 778.917202] R13: 0000000000000004 R14: 00000000200001b0 R15: 0000000000000002 [ 778.934126] erofs: bogus i_mode (300) @ nid 36 07:25:54 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:54 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:54 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040003f0000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 779.038196] erofs: read_super, device -> /dev/loop5 [ 779.043575] erofs: options -> noacl, [ 779.072747] erofs: root inode @ nid 0 [ 779.083327] erofs: bogus i_mode (0) @ nid 0 [ 779.108665] squashfs: SQUASHFS error: unable to read fragment index table 07:25:54 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 9) 07:25:55 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 779.208071] erofs: read_super, device -> /dev/loop1 [ 779.213451] erofs: read_super, device -> /dev/loop2 [ 779.221668] erofs: read_super, device -> /dev/loop4 [ 779.236275] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 779.266441] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 779.266728] FAULT_INJECTION: forcing a failure. [ 779.266728] name failslab, interval 1, probability 0, space 0, times 0 [ 779.275333] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 779.297377] erofs: root inode @ nid 36 [ 779.306542] erofs: root inode @ nid 36 [ 779.311872] erofs: bogus i_mode (0) @ nid 36 [ 779.312006] CPU: 0 PID: 27107 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 779.320270] erofs: bogus i_mode (0) @ nid 36 [ 779.324160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 779.324166] Call Trace: [ 779.324188] dump_stack+0x1fc/0x2ef [ 779.324208] should_fail.cold+0xa/0xf [ 779.324227] ? setup_fault_attr+0x200/0x200 [ 779.324242] ? lock_acquire+0x170/0x3c0 [ 779.324260] __should_failslab+0x115/0x180 [ 779.324277] should_failslab+0x5/0x10 07:25:55 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 10) 07:25:55 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000400000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 779.324290] kmem_cache_alloc+0x277/0x370 [ 779.324306] __alloc_file+0x21/0x340 [ 779.324324] alloc_empty_file+0x6d/0x170 [ 779.324341] path_openat+0xe9/0x2df0 [ 779.324354] ? __lock_acquire+0x6de/0x3ff0 [ 779.324376] ? path_lookupat+0x8d0/0x8d0 [ 779.324393] ? mark_held_locks+0xf0/0xf0 [ 779.324415] do_filp_open+0x18c/0x3f0 [ 779.324427] ? may_open_dev+0xf0/0xf0 [ 779.324443] ? __alloc_fd+0x28d/0x570 [ 779.324462] ? lock_downgrade+0x720/0x720 [ 779.324475] ? lock_acquire+0x170/0x3c0 [ 779.324487] ? __alloc_fd+0x34/0x570 [ 779.324504] ? do_raw_spin_unlock+0x171/0x230 [ 779.324520] ? _raw_spin_unlock+0x29/0x40 [ 779.324532] ? __alloc_fd+0x28d/0x570 [ 779.324553] do_sys_open+0x3b3/0x520 [ 779.324568] ? filp_open+0x70/0x70 [ 779.324587] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 779.324604] ? trace_hardirqs_off_caller+0x6e/0x210 [ 779.324619] ? do_syscall_64+0x21/0x620 [ 779.324636] do_syscall_64+0xf9/0x620 [ 779.324653] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 779.324665] RIP: 0033:0x7fe048224f64 07:25:55 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 779.324678] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 779.324685] RSP: 002b:00007fe046be6eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 779.324698] RAX: ffffffffffffffda RBX: 00007fe0482bb9c8 RCX: 00007fe048224f64 [ 779.324706] RDX: 0000000000000002 RSI: 00007fe046be6fe0 RDI: 00000000ffffff9c [ 779.324713] RBP: 00007fe046be6fe0 R08: 0000000000000000 R09: 00007fe046be71d0 [ 779.324720] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 779.324729] R13: 0000000000000004 R14: 00000000200001b0 R15: 0000000000000002 [ 779.364542] erofs: root inode @ nid 36 [ 779.530673] erofs: bogus i_mode (300) @ nid 36 [ 779.612551] FAULT_INJECTION: forcing a failure. [ 779.612551] name failslab, interval 1, probability 0, space 0, times 0 [ 779.624107] CPU: 0 PID: 27122 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 779.632003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 779.641346] Call Trace: [ 779.643942] dump_stack+0x1fc/0x2ef [ 779.647576] should_fail.cold+0xa/0xf [ 779.651374] ? setup_fault_attr+0x200/0x200 [ 779.655691] ? lock_acquire+0x170/0x3c0 [ 779.659661] __should_failslab+0x115/0x180 [ 779.663892] should_failslab+0x5/0x10 [ 779.667700] kmem_cache_alloc_trace+0x284/0x380 [ 779.672382] apparmor_file_alloc_security+0x394/0xad0 [ 779.677559] ? apparmor_file_receive+0x160/0x160 [ 779.682300] ? __alloc_file+0x21/0x340 [ 779.686190] security_file_alloc+0x40/0x90 [ 779.690418] __alloc_file+0xd8/0x340 [ 779.694134] alloc_empty_file+0x6d/0x170 [ 779.698275] path_openat+0xe9/0x2df0 [ 779.701974] ? __lock_acquire+0x6de/0x3ff0 [ 779.706213] ? path_lookupat+0x8d0/0x8d0 [ 779.710283] ? mark_held_locks+0xf0/0xf0 [ 779.714343] do_filp_open+0x18c/0x3f0 [ 779.718131] ? may_open_dev+0xf0/0xf0 [ 779.721928] ? __alloc_fd+0x28d/0x570 [ 779.725735] ? lock_downgrade+0x720/0x720 [ 779.729885] ? lock_acquire+0x170/0x3c0 [ 779.733855] ? __alloc_fd+0x34/0x570 [ 779.737564] ? do_raw_spin_unlock+0x171/0x230 [ 779.742068] ? _raw_spin_unlock+0x29/0x40 [ 779.746216] ? __alloc_fd+0x28d/0x570 [ 779.750028] do_sys_open+0x3b3/0x520 [ 779.753750] ? filp_open+0x70/0x70 [ 779.757287] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 779.762656] ? trace_hardirqs_off_caller+0x6e/0x210 [ 779.767677] ? do_syscall_64+0x21/0x620 [ 779.771651] do_syscall_64+0xf9/0x620 [ 779.775442] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 779.780615] RIP: 0033:0x7fe048224f64 [ 779.784326] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 779.803218] RSP: 002b:00007fe046be6eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 07:25:55 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:55 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000480000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 779.810920] RAX: ffffffffffffffda RBX: 00007fe0482bb9c8 RCX: 00007fe048224f64 [ 779.818178] RDX: 0000000000000002 RSI: 00007fe046be6fe0 RDI: 00000000ffffff9c [ 779.825439] RBP: 00007fe046be6fe0 R08: 0000000000000000 R09: 00007fe046be71d0 [ 779.832701] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 779.839958] R13: 0000000000000004 R14: 00000000200001b0 R15: 0000000000000002 07:25:55 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 11) 07:25:55 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {0x0, 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 779.899393] squashfs: SQUASHFS error: unable to read fragment index table 07:25:55 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 780.006858] FAULT_INJECTION: forcing a failure. [ 780.006858] name failslab, interval 1, probability 0, space 0, times 0 [ 780.022765] CPU: 0 PID: 27135 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 780.030667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 780.040008] Call Trace: [ 780.042585] dump_stack+0x1fc/0x2ef [ 780.046204] should_fail.cold+0xa/0xf [ 780.049998] ? setup_fault_attr+0x200/0x200 [ 780.054306] ? lock_acquire+0x170/0x3c0 [ 780.058267] __should_failslab+0x115/0x180 [ 780.062488] should_failslab+0x5/0x10 [ 780.066293] kmem_cache_alloc_trace+0x284/0x380 [ 780.070952] ? loop_info64_to_compat+0x5e0/0x5e0 [ 780.075699] __kthread_create_on_node+0xd2/0x410 [ 780.080448] ? kthread_parkme+0xa0/0xa0 [ 780.084406] ? lock_acquire+0x170/0x3c0 [ 780.088370] ? lo_ioctl+0x1bb/0x20e0 [ 780.092073] ? __mutex_lock+0x368/0x1190 [ 780.096136] ? lock_downgrade+0x720/0x720 [ 780.100272] ? check_preemption_disabled+0x41/0x280 [ 780.105276] ? loop_info64_to_compat+0x5e0/0x5e0 [ 780.110021] kthread_create_on_node+0xbb/0xf0 [ 780.114505] ? __kthread_create_on_node+0x410/0x410 [ 780.119504] ? __fget+0x356/0x510 [ 780.122943] ? do_dup2+0x450/0x450 [ 780.126472] ? __lockdep_init_map+0x100/0x5a0 [ 780.130951] ? __lockdep_init_map+0x100/0x5a0 [ 780.135436] lo_ioctl+0xae5/0x20e0 [ 780.138962] ? loop_set_status64+0x110/0x110 [ 780.143355] blkdev_ioctl+0x5cb/0x1a80 [ 780.147228] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 780.152578] ? blkpg_ioctl+0x9d0/0x9d0 [ 780.156462] ? mark_held_locks+0xf0/0xf0 [ 780.160507] ? mark_held_locks+0xf0/0xf0 [ 780.164563] ? debug_check_no_obj_freed+0x201/0x490 [ 780.169563] ? lock_downgrade+0x720/0x720 [ 780.173692] block_ioctl+0xe9/0x130 [ 780.177298] ? blkdev_fallocate+0x3f0/0x3f0 [ 780.181609] do_vfs_ioctl+0xcdb/0x12e0 [ 780.185485] ? lock_downgrade+0x720/0x720 [ 780.189646] ? check_preemption_disabled+0x41/0x280 [ 780.194651] ? ioctl_preallocate+0x200/0x200 [ 780.199044] ? __fget+0x356/0x510 [ 780.202479] ? do_dup2+0x450/0x450 [ 780.205999] ? do_sys_open+0x2bf/0x520 [ 780.209871] ksys_ioctl+0x9b/0xc0 [ 780.213309] __x64_sys_ioctl+0x6f/0xb0 [ 780.217179] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 780.221761] do_syscall_64+0xf9/0x620 [ 780.225571] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 780.230744] RIP: 0033:0x7fe048271e07 [ 780.234570] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 780.253456] RSP: 002b:00007fe046be6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 780.261167] RAX: ffffffffffffffda RBX: 00007fe0482bb9c8 RCX: 00007fe048271e07 [ 780.268420] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 780.275672] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe046be71d0 [ 780.282924] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 780.290198] R13: 0000000000000004 R14: 00000000200001b0 R15: 0000000000000002 [ 780.301411] erofs: read_super, device -> /dev/loop4 07:25:56 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 12) [ 780.343986] erofs: read_super, device -> /dev/loop2 [ 780.349891] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 780.357662] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 780.365056] erofs: root inode @ nid 36 [ 780.369341] erofs: bogus i_mode (300) @ nid 36 [ 780.374548] erofs: root inode @ nid 36 [ 780.379573] erofs: mounted on /dev/loop2 with opts: noacl. 07:25:56 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040004c0000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 780.389585] erofs: read_super, device -> /dev/loop1 [ 780.396503] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 780.403909] erofs: root inode @ nid 36 [ 780.419073] erofs: bogus i_mode (0) @ nid 36 07:25:56 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:56 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c0", 0x5, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 780.450961] squashfs: SQUASHFS error: unable to read fragment index table [ 780.463178] FAULT_INJECTION: forcing a failure. [ 780.463178] name failslab, interval 1, probability 0, space 0, times 0 [ 780.480666] erofs: unmounted for /dev/loop2 [ 780.487530] CPU: 0 PID: 27155 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 780.495430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 780.504785] Call Trace: [ 780.507379] dump_stack+0x1fc/0x2ef [ 780.511004] should_fail.cold+0xa/0xf [ 780.514807] ? setup_fault_attr+0x200/0x200 [ 780.519131] ? lock_acquire+0x170/0x3c0 [ 780.523093] __should_failslab+0x115/0x180 [ 780.527320] should_failslab+0x5/0x10 [ 780.531131] kmem_cache_alloc+0x277/0x370 [ 780.535279] __kernfs_new_node+0xd2/0x680 [ 780.539442] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 780.544193] ? _raw_spin_unlock_irq+0x5a/0x80 [ 780.548686] ? __cpu_to_node+0x7b/0xa0 [ 780.552560] ? mark_held_locks+0xf0/0xf0 [ 780.556604] ? io_schedule_timeout+0x140/0x140 [ 780.561167] ? enqueue_entity+0xf86/0x3850 [ 780.565396] ? set_user_nice.part.0+0x3b9/0xab0 [ 780.570059] kernfs_create_dir_ns+0x9e/0x230 [ 780.574462] internal_create_group+0x1c1/0xb20 [ 780.579041] ? sysfs_remove_link_from_group+0x70/0x70 [ 780.584221] ? lock_downgrade+0x720/0x720 [ 780.588369] lo_ioctl+0xf7c/0x20e0 [ 780.591897] ? loop_set_status64+0x110/0x110 [ 780.596290] blkdev_ioctl+0x5cb/0x1a80 [ 780.600160] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 780.605519] ? blkpg_ioctl+0x9d0/0x9d0 [ 780.609406] ? mark_held_locks+0xf0/0xf0 [ 780.613455] ? mark_held_locks+0xf0/0xf0 [ 780.617504] ? debug_check_no_obj_freed+0x201/0x490 [ 780.622545] ? lock_downgrade+0x720/0x720 [ 780.626702] block_ioctl+0xe9/0x130 [ 780.630328] ? blkdev_fallocate+0x3f0/0x3f0 [ 780.634652] do_vfs_ioctl+0xcdb/0x12e0 [ 780.638555] ? lock_downgrade+0x720/0x720 [ 780.642690] ? check_preemption_disabled+0x41/0x280 [ 780.647700] ? ioctl_preallocate+0x200/0x200 [ 780.652101] ? __fget+0x356/0x510 [ 780.655542] ? do_dup2+0x450/0x450 [ 780.659066] ? do_sys_open+0x2bf/0x520 [ 780.662946] ksys_ioctl+0x9b/0xc0 [ 780.666397] __x64_sys_ioctl+0x6f/0xb0 [ 780.670288] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 780.674871] do_syscall_64+0xf9/0x620 [ 780.678671] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 780.683847] RIP: 0033:0x7fe048271e07 [ 780.687557] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 780.706454] RSP: 002b:00007fe046be6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 780.714164] RAX: ffffffffffffffda RBX: 00007fe0482bb9c8 RCX: 00007fe048271e07 [ 780.721424] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 780.728678] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe046be71d0 [ 780.735993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 780.743243] R13: 0000000000000004 R14: 00000000200001b0 R15: 0000000000000002 [ 780.833469] erofs: read_super, device -> /dev/loop5 [ 780.838902] erofs: options -> noacl, [ 780.847113] erofs: root inode @ nid 0 [ 780.854310] erofs: bogus i_mode (0) @ nid 0 07:25:56 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:25:56 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {0x0, 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:56 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 13) 07:25:56 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000600000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 780.964000] erofs: read_super, device -> /dev/loop4 [ 780.978043] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 781.022188] erofs: root inode @ nid 36 [ 781.042999] erofs: bogus i_mode (0) @ nid 36 [ 781.062738] FAULT_INJECTION: forcing a failure. [ 781.062738] name failslab, interval 1, probability 0, space 0, times 0 [ 781.075320] CPU: 0 PID: 27180 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 781.083217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 781.092571] Call Trace: [ 781.095158] dump_stack+0x1fc/0x2ef [ 781.098785] should_fail.cold+0xa/0xf [ 781.102571] ? setup_fault_attr+0x200/0x200 [ 781.106887] ? lock_acquire+0x170/0x3c0 [ 781.110861] __should_failslab+0x115/0x180 [ 781.115096] should_failslab+0x5/0x10 [ 781.118891] kmem_cache_alloc+0x277/0x370 [ 781.123027] __kernfs_new_node+0xd2/0x680 [ 781.127166] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 781.131911] ? kernfs_activate+0x2c/0x1d0 [ 781.136055] ? lock_downgrade+0x720/0x720 [ 781.140195] ? kernfs_add_one+0x51/0x4c0 [ 781.144259] ? mutex_trylock+0x1a0/0x1a0 [ 781.148329] ? __mutex_unlock_slowpath+0xea/0x610 [ 781.153168] kernfs_new_node+0x92/0x120 [ 781.157144] __kernfs_create_file+0x51/0x340 [ 781.161552] sysfs_add_file_mode_ns+0x226/0x540 [ 781.166227] internal_create_group+0x355/0xb20 [ 781.170810] ? sysfs_remove_link_from_group+0x70/0x70 [ 781.175993] ? lock_downgrade+0x720/0x720 [ 781.180554] lo_ioctl+0xf7c/0x20e0 [ 781.184118] ? loop_set_status64+0x110/0x110 [ 781.188540] blkdev_ioctl+0x5cb/0x1a80 [ 781.192421] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 781.197769] ? blkpg_ioctl+0x9d0/0x9d0 [ 781.201642] ? mark_held_locks+0xf0/0xf0 [ 781.205695] ? mark_held_locks+0xf0/0xf0 [ 781.209754] ? debug_check_no_obj_freed+0x201/0x490 [ 781.214774] ? lock_downgrade+0x720/0x720 [ 781.218916] block_ioctl+0xe9/0x130 [ 781.222525] ? blkdev_fallocate+0x3f0/0x3f0 [ 781.226844] do_vfs_ioctl+0xcdb/0x12e0 [ 781.230726] ? lock_downgrade+0x720/0x720 [ 781.234880] ? check_preemption_disabled+0x41/0x280 [ 781.239890] ? ioctl_preallocate+0x200/0x200 [ 781.244304] ? __fget+0x356/0x510 [ 781.247769] ? do_dup2+0x450/0x450 [ 781.251304] ? do_sys_open+0x2bf/0x520 [ 781.255193] ksys_ioctl+0x9b/0xc0 [ 781.258657] __x64_sys_ioctl+0x6f/0xb0 [ 781.262533] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 781.267107] do_syscall_64+0xf9/0x620 [ 781.271602] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 781.276796] RIP: 0033:0x7fe048271e07 [ 781.280497] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 781.299403] RSP: 002b:00007fe046be6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 781.307103] RAX: ffffffffffffffda RBX: 00007fe0482bb9c8 RCX: 00007fe048271e07 [ 781.314509] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 781.321782] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe046be71d0 [ 781.329049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 781.336311] R13: 0000000000000004 R14: 00000000200001b0 R15: 0000000000000002 [ 781.362431] erofs: read_super, device -> /dev/loop2 [ 781.371287] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 781.390809] erofs: root inode @ nid 36 [ 781.396848] erofs: bogus i_mode (300) @ nid 36 [ 781.403501] squashfs: SQUASHFS error: unable to read fragment index table 07:25:57 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:57 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c0", 0x5, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 781.413054] erofs: read_super, device -> /dev/loop5 [ 781.428609] erofs: options -> noacl, [ 781.446635] erofs: root inode @ nid 0 [ 781.454434] erofs: bogus i_mode (0) @ nid 0 07:25:57 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000680000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 781.517496] erofs: read_super, device -> /dev/loop1 [ 781.522549] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 781.530387] erofs: root inode @ nid 36 [ 781.534992] erofs: bogus i_mode (0) @ nid 36 07:25:57 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:25:57 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 14) 07:25:57 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {0x0, 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 781.635568] erofs: read_super, device -> /dev/loop2 [ 781.640619] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 781.641294] erofs: read_super, device -> /dev/loop4 [ 781.670381] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 781.703145] erofs: root inode @ nid 36 [ 781.704576] erofs: root inode @ nid 36 [ 781.719496] erofs: bogus i_mode (300) @ nid 36 [ 781.729966] erofs: bogus i_mode (0) @ nid 36 07:25:57 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c0", 0x5, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 781.802310] FAULT_INJECTION: forcing a failure. [ 781.802310] name failslab, interval 1, probability 0, space 0, times 0 [ 781.813679] CPU: 0 PID: 27222 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 781.821560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 781.830898] Call Trace: [ 781.833474] dump_stack+0x1fc/0x2ef [ 781.837105] should_fail.cold+0xa/0xf [ 781.840900] ? setup_fault_attr+0x200/0x200 [ 781.845217] ? lock_acquire+0x170/0x3c0 [ 781.849199] __should_failslab+0x115/0x180 [ 781.853424] should_failslab+0x5/0x10 [ 781.857210] kmem_cache_alloc+0x277/0x370 [ 781.861347] __kernfs_new_node+0xd2/0x680 [ 781.865481] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 781.870232] ? __mutex_unlock_slowpath+0xea/0x610 [ 781.875168] ? wait_for_completion_io+0x10/0x10 [ 781.879919] ? kernfs_next_descendant_post+0x19c/0x290 [ 781.885205] kernfs_new_node+0x92/0x120 [ 781.889174] __kernfs_create_file+0x51/0x340 [ 781.893568] sysfs_add_file_mode_ns+0x226/0x540 [ 781.898226] internal_create_group+0x355/0xb20 [ 781.902798] ? sysfs_remove_link_from_group+0x70/0x70 [ 781.907971] ? lock_downgrade+0x720/0x720 [ 781.912108] lo_ioctl+0xf7c/0x20e0 [ 781.915635] ? loop_set_status64+0x110/0x110 [ 781.920032] blkdev_ioctl+0x5cb/0x1a80 [ 781.923903] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 781.929249] ? blkpg_ioctl+0x9d0/0x9d0 [ 781.933138] ? mark_held_locks+0xf0/0xf0 [ 781.937184] ? mark_held_locks+0xf0/0xf0 [ 781.941231] ? debug_check_no_obj_freed+0x201/0x490 [ 781.946231] ? lock_downgrade+0x720/0x720 [ 781.950361] block_ioctl+0xe9/0x130 [ 781.953981] ? blkdev_fallocate+0x3f0/0x3f0 [ 781.958299] do_vfs_ioctl+0xcdb/0x12e0 [ 781.962168] ? lock_downgrade+0x720/0x720 [ 781.966324] ? check_preemption_disabled+0x41/0x280 [ 781.971336] ? ioctl_preallocate+0x200/0x200 [ 781.975743] ? __fget+0x356/0x510 [ 781.979209] ? do_dup2+0x450/0x450 [ 781.982733] ? do_sys_open+0x2bf/0x520 [ 781.986607] ksys_ioctl+0x9b/0xc0 [ 781.990058] __x64_sys_ioctl+0x6f/0xb0 [ 781.993949] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 781.998533] do_syscall_64+0xf9/0x620 [ 782.002330] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 782.007513] RIP: 0033:0x7fe048271e07 [ 782.011216] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 782.030099] RSP: 002b:00007fe046be6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 782.037794] RAX: ffffffffffffffda RBX: 00007fe0482bb9c8 RCX: 00007fe048271e07 [ 782.045051] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 07:25:57 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040006c0000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 782.052311] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe046be71d0 [ 782.059564] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 782.066820] R13: 0000000000000004 R14: 00000000200001b0 R15: 0000000000000002 [ 782.084426] squashfs: SQUASHFS error: unable to read fragment index table 07:25:57 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 782.199531] erofs: read_super, device -> /dev/loop1 [ 782.207984] erofs: read_super, device -> /dev/loop5 [ 782.212259] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 782.213021] erofs: options -> noacl, 07:25:58 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 782.243661] erofs: root inode @ nid 0 [ 782.253293] erofs: read_super, device -> /dev/loop2 [ 782.261760] erofs: bogus i_mode (0) @ nid 0 [ 782.276205] erofs: root inode @ nid 36 [ 782.293819] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 782.310006] erofs: bogus i_mode (0) @ nid 36 [ 782.332160] erofs: root inode @ nid 36 07:25:58 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 15) 07:25:58 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 782.352862] erofs: bogus i_mode (300) @ nid 36 [ 782.475433] FAULT_INJECTION: forcing a failure. [ 782.475433] name failslab, interval 1, probability 0, space 0, times 0 [ 782.487151] CPU: 1 PID: 27248 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 782.495043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 782.504399] Call Trace: [ 782.506987] dump_stack+0x1fc/0x2ef [ 782.510610] should_fail.cold+0xa/0xf [ 782.514410] ? is_bpf_text_address+0xfc/0x1b0 [ 782.518915] ? setup_fault_attr+0x200/0x200 [ 782.523245] ? kernel_text_address+0xbd/0xf0 [ 782.527653] ? __kernel_text_address+0x9/0x30 [ 782.532142] ? unwind_get_return_address+0x51/0x90 [ 782.537059] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 782.542411] __should_failslab+0x115/0x180 [ 782.546630] should_failslab+0x5/0x10 [ 782.550415] kmem_cache_alloc+0x3f/0x370 [ 782.554463] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 782.560070] idr_get_free+0x50e/0xa10 [ 782.563860] idr_alloc_u32+0x1a5/0x320 [ 782.567730] ? __fprop_inc_percpu_max+0x210/0x210 [ 782.572558] ? mark_held_locks+0xf0/0xf0 [ 782.576598] ? node_tag_clear+0xb5/0x1b0 [ 782.580643] ? should_fail+0x142/0x7b0 [ 782.584511] ? fs_reclaim_release+0xd0/0x110 [ 782.588901] idr_alloc_cyclic+0x102/0x230 [ 782.593044] ? idr_alloc+0x130/0x130 [ 782.596745] ? __kernfs_new_node+0xf9/0x680 [ 782.601062] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 782.606089] __kernfs_new_node+0x11a/0x680 [ 782.610308] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 782.615046] ? __mutex_unlock_slowpath+0xea/0x610 [ 782.619883] ? wait_for_completion_io+0x10/0x10 [ 782.624544] ? kernfs_next_descendant_post+0x19c/0x290 [ 782.629819] kernfs_new_node+0x92/0x120 [ 782.633787] __kernfs_create_file+0x51/0x340 [ 782.638181] sysfs_add_file_mode_ns+0x226/0x540 [ 782.642836] internal_create_group+0x355/0xb20 [ 782.647418] ? sysfs_remove_link_from_group+0x70/0x70 [ 782.652600] ? lock_downgrade+0x720/0x720 [ 782.656739] lo_ioctl+0xf7c/0x20e0 [ 782.660263] ? loop_set_status64+0x110/0x110 [ 782.664655] blkdev_ioctl+0x5cb/0x1a80 [ 782.668534] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 782.673888] ? blkpg_ioctl+0x9d0/0x9d0 [ 782.677775] ? mark_held_locks+0xf0/0xf0 [ 782.681837] ? mark_held_locks+0xf0/0xf0 [ 782.685902] ? debug_check_no_obj_freed+0x201/0x490 [ 782.690912] ? lock_downgrade+0x720/0x720 [ 782.695042] block_ioctl+0xe9/0x130 [ 782.698649] ? blkdev_fallocate+0x3f0/0x3f0 [ 782.702954] do_vfs_ioctl+0xcdb/0x12e0 [ 782.706836] ? lock_downgrade+0x720/0x720 [ 782.710988] ? check_preemption_disabled+0x41/0x280 [ 782.715992] ? ioctl_preallocate+0x200/0x200 [ 782.720382] ? __fget+0x356/0x510 [ 782.723816] ? do_dup2+0x450/0x450 [ 782.727342] ? do_sys_open+0x2bf/0x520 [ 782.731218] ksys_ioctl+0x9b/0xc0 [ 782.734655] __x64_sys_ioctl+0x6f/0xb0 [ 782.738526] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 782.743095] do_syscall_64+0xf9/0x620 [ 782.746892] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 782.752069] RIP: 0033:0x7fe048271e07 [ 782.755773] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 782.774655] RSP: 002b:00007fe046be6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 782.782343] RAX: ffffffffffffffda RBX: 00007fe0482bb9c8 RCX: 00007fe048271e07 [ 782.789604] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 782.796858] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe046be71d0 [ 782.804115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 782.811380] R13: 0000000000000004 R14: 00000000200001b0 R15: 0000000000000002 [ 782.821053] erofs: read_super, device -> /dev/loop4 [ 782.826365] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 782.839211] erofs: root inode @ nid 36 [ 782.843203] erofs: bogus i_mode (0) @ nid 36 [ 782.856090] squashfs: SQUASHFS error: unable to read fragment index table [ 782.864137] erofs: read_super, device -> /dev/loop5 07:25:58 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000740000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:25:58 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 782.879461] erofs: options -> noacl, [ 782.883288] erofs: root inode @ nid 0 [ 782.905458] erofs: read_super, device -> /dev/loop1 [ 782.919328] erofs: bogus i_mode (0) @ nid 0 07:25:58 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 782.929214] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 782.963329] erofs: root inode @ nid 36 [ 782.973033] erofs: bogus i_mode (0) @ nid 36 07:25:58 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:25:58 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:58 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 16) [ 783.065130] erofs: read_super, device -> /dev/loop2 [ 783.072297] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 783.109861] erofs: read_super, device -> /dev/loop4 07:25:58 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040007a0000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 783.146602] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 783.149527] erofs: root inode @ nid 36 [ 783.161387] erofs: cannot find valid erofs superblock [ 783.226696] erofs: bogus i_mode (0) @ nid 36 07:25:59 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 783.261316] squashfs: SQUASHFS error: unable to read fragment index table [ 783.386697] FAULT_INJECTION: forcing a failure. [ 783.386697] name failslab, interval 1, probability 0, space 0, times 0 [ 783.398647] CPU: 1 PID: 27292 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 783.406533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 783.415882] Call Trace: [ 783.418459] dump_stack+0x1fc/0x2ef [ 783.422071] should_fail.cold+0xa/0xf [ 783.425862] ? setup_fault_attr+0x200/0x200 [ 783.430171] ? lock_acquire+0x170/0x3c0 [ 783.434240] __should_failslab+0x115/0x180 [ 783.438466] should_failslab+0x5/0x10 [ 783.442261] kmem_cache_alloc+0x277/0x370 [ 783.446411] __kernfs_new_node+0xd2/0x680 [ 783.450547] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 783.455294] ? __mutex_unlock_slowpath+0xea/0x610 [ 783.460127] ? wait_for_completion_io+0x10/0x10 [ 783.464785] ? kernfs_next_descendant_post+0x19c/0x290 [ 783.470062] kernfs_new_node+0x92/0x120 [ 783.474032] __kernfs_create_file+0x51/0x340 [ 783.478425] sysfs_add_file_mode_ns+0x226/0x540 [ 783.483104] internal_create_group+0x355/0xb20 [ 783.487676] ? sysfs_remove_link_from_group+0x70/0x70 [ 783.492848] ? lock_downgrade+0x720/0x720 [ 783.497032] lo_ioctl+0xf7c/0x20e0 [ 783.500560] ? loop_set_status64+0x110/0x110 [ 783.504955] blkdev_ioctl+0x5cb/0x1a80 [ 783.508839] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 783.514191] ? blkpg_ioctl+0x9d0/0x9d0 [ 783.518065] ? mark_held_locks+0xf0/0xf0 [ 783.522121] ? mark_held_locks+0xf0/0xf0 [ 783.526177] ? debug_check_no_obj_freed+0x201/0x490 [ 783.531180] ? lock_downgrade+0x720/0x720 [ 783.535314] block_ioctl+0xe9/0x130 [ 783.538922] ? blkdev_fallocate+0x3f0/0x3f0 [ 783.543238] do_vfs_ioctl+0xcdb/0x12e0 [ 783.547121] ? lock_downgrade+0x720/0x720 [ 783.551252] ? check_preemption_disabled+0x41/0x280 [ 783.556245] ? ioctl_preallocate+0x200/0x200 [ 783.560637] ? __fget+0x356/0x510 [ 783.564072] ? do_dup2+0x450/0x450 [ 783.567603] ? do_sys_open+0x2bf/0x520 [ 783.571485] ksys_ioctl+0x9b/0xc0 [ 783.574923] __x64_sys_ioctl+0x6f/0xb0 [ 783.578799] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 783.583365] do_syscall_64+0xf9/0x620 [ 783.587149] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 783.592319] RIP: 0033:0x7fe048271e07 [ 783.596014] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 783.614897] RSP: 002b:00007fe046be6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 783.622586] RAX: ffffffffffffffda RBX: 00007fe0482bb9c8 RCX: 00007fe048271e07 [ 783.629836] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 07:25:59 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004003820000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:25:59 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 783.637087] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe046be71d0 [ 783.644335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 783.651583] R13: 0000000000000004 R14: 00000000200001b0 R15: 0000000000000002 [ 783.672898] erofs: read_super, device -> /dev/loop1 07:25:59 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 783.699433] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 783.711379] erofs: read_super, device -> /dev/loop5 [ 783.724889] erofs: root inode @ nid 36 [ 783.730366] erofs: options -> noacl, [ 783.737684] erofs: bogus i_mode (0) @ nid 36 [ 783.744398] erofs: root inode @ nid 0 [ 783.758485] erofs: bogus i_mode (0) @ nid 0 07:25:59 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:25:59 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 17) [ 783.843327] erofs: read_super, device -> /dev/loop4 [ 783.857014] erofs: read_super, device -> /dev/loop2 07:25:59 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040268a0000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 783.885127] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 783.888219] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 783.906405] squashfs: SQUASHFS error: unable to read fragment index table [ 783.913063] erofs: root inode @ nid 36 [ 783.918104] erofs: bogus i_mode (0) @ nid 36 07:25:59 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 783.951347] erofs: cannot find valid erofs superblock [ 783.978794] FAULT_INJECTION: forcing a failure. [ 783.978794] name failslab, interval 1, probability 0, space 0, times 0 [ 783.992812] CPU: 0 PID: 27331 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 784.000709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 784.010237] Call Trace: [ 784.012923] dump_stack+0x1fc/0x2ef [ 784.016561] should_fail.cold+0xa/0xf [ 784.020369] ? setup_fault_attr+0x200/0x200 [ 784.024699] ? lock_acquire+0x170/0x3c0 [ 784.028686] __should_failslab+0x115/0x180 [ 784.032927] should_failslab+0x5/0x10 [ 784.036733] kmem_cache_alloc+0x277/0x370 [ 784.040891] __kernfs_new_node+0xd2/0x680 [ 784.045053] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 784.049803] ? __mutex_unlock_slowpath+0xea/0x610 [ 784.054643] ? wait_for_completion_io+0x10/0x10 [ 784.059310] ? kernfs_next_descendant_post+0x19c/0x290 [ 784.064591] kernfs_new_node+0x92/0x120 [ 784.068562] __kernfs_create_file+0x51/0x340 [ 784.072954] sysfs_add_file_mode_ns+0x226/0x540 [ 784.077609] internal_create_group+0x355/0xb20 [ 784.082193] ? sysfs_remove_link_from_group+0x70/0x70 [ 784.087386] ? lock_downgrade+0x720/0x720 [ 784.091528] lo_ioctl+0xf7c/0x20e0 [ 784.095070] ? loop_set_status64+0x110/0x110 [ 784.099472] blkdev_ioctl+0x5cb/0x1a80 [ 784.103351] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 784.108701] ? blkpg_ioctl+0x9d0/0x9d0 [ 784.112581] ? mark_held_locks+0xf0/0xf0 [ 784.116636] ? mark_held_locks+0xf0/0xf0 [ 784.120692] ? debug_check_no_obj_freed+0x201/0x490 [ 784.125720] ? lock_downgrade+0x720/0x720 [ 784.129869] block_ioctl+0xe9/0x130 [ 784.133490] ? blkdev_fallocate+0x3f0/0x3f0 [ 784.137810] do_vfs_ioctl+0xcdb/0x12e0 [ 784.141685] ? lock_downgrade+0x720/0x720 [ 784.145829] ? check_preemption_disabled+0x41/0x280 [ 784.150838] ? ioctl_preallocate+0x200/0x200 [ 784.155245] ? __fget+0x356/0x510 [ 784.158694] ? do_dup2+0x450/0x450 [ 784.162217] ? do_sys_open+0x2bf/0x520 [ 784.166106] ksys_ioctl+0x9b/0xc0 [ 784.169552] __x64_sys_ioctl+0x6f/0xb0 [ 784.173428] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 784.177996] do_syscall_64+0xf9/0x620 [ 784.181797] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 784.186985] RIP: 0033:0x7fe048271e07 [ 784.190689] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 784.209667] RSP: 002b:00007fe046be6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 784.217361] RAX: ffffffffffffffda RBX: 00007fe0482bb9c8 RCX: 00007fe048271e07 [ 784.224617] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 784.231876] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe046be71d0 [ 784.239127] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 07:26:00 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 784.246385] R13: 0000000000000004 R14: 00000000200001b0 R15: 0000000000000002 07:26:00 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 784.316519] erofs: read_super, device -> /dev/loop5 [ 784.322961] erofs: options -> noacl, [ 784.327140] erofs: read_super, device -> /dev/loop1 [ 784.332161] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 784.353023] erofs: root inode @ nid 0 07:26:00 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040038f0000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 784.364591] erofs: root inode @ nid 36 [ 784.371225] erofs: bogus i_mode (0) @ nid 0 [ 784.380599] erofs: bogus i_mode (0) @ nid 36 [ 784.398477] squashfs: SQUASHFS error: unable to read fragment index table 07:26:00 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 784.524619] erofs: read_super, device -> /dev/loop2 07:26:00 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c04100007400000000000000", 0x10, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:00 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 18) [ 784.559242] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 784.567876] erofs: read_super, device -> /dev/loop4 [ 784.593749] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, 07:26:00 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004003900000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 784.607851] erofs: root inode @ nid 36 [ 784.616922] erofs: cannot find valid erofs superblock [ 784.623446] erofs: bogus i_mode (0) @ nid 36 [ 784.729240] FAULT_INJECTION: forcing a failure. [ 784.729240] name failslab, interval 1, probability 0, space 0, times 0 [ 784.754382] CPU: 0 PID: 27373 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 784.762266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 784.771603] Call Trace: [ 784.774177] dump_stack+0x1fc/0x2ef [ 784.777797] should_fail.cold+0xa/0xf [ 784.781581] ? setup_fault_attr+0x200/0x200 [ 784.785886] ? lock_acquire+0x170/0x3c0 [ 784.789850] __should_failslab+0x115/0x180 [ 784.794079] should_failslab+0x5/0x10 [ 784.797871] kmem_cache_alloc+0x277/0x370 [ 784.802015] __kernfs_new_node+0xd2/0x680 [ 784.806147] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 784.810889] ? __mutex_unlock_slowpath+0xea/0x610 [ 784.815721] ? wait_for_completion_io+0x10/0x10 [ 784.820372] ? kernfs_next_descendant_post+0x19c/0x290 [ 784.825654] kernfs_new_node+0x92/0x120 [ 784.829622] __kernfs_create_file+0x51/0x340 [ 784.834018] sysfs_add_file_mode_ns+0x226/0x540 [ 784.838672] internal_create_group+0x355/0xb20 [ 784.843253] ? sysfs_remove_link_from_group+0x70/0x70 [ 784.848438] ? lock_downgrade+0x720/0x720 [ 784.852581] lo_ioctl+0xf7c/0x20e0 [ 784.856115] ? loop_set_status64+0x110/0x110 [ 784.860509] blkdev_ioctl+0x5cb/0x1a80 [ 784.864387] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 784.869737] ? blkpg_ioctl+0x9d0/0x9d0 [ 784.873623] ? mark_held_locks+0xf0/0xf0 [ 784.877679] ? mark_held_locks+0xf0/0xf0 [ 784.881727] ? debug_check_no_obj_freed+0x201/0x490 [ 784.886741] ? lock_downgrade+0x720/0x720 [ 784.890877] block_ioctl+0xe9/0x130 [ 784.894626] ? blkdev_fallocate+0x3f0/0x3f0 [ 784.898939] do_vfs_ioctl+0xcdb/0x12e0 [ 784.902829] ? lock_downgrade+0x720/0x720 [ 784.906969] ? check_preemption_disabled+0x41/0x280 [ 784.911966] ? ioctl_preallocate+0x200/0x200 [ 784.916361] ? __fget+0x356/0x510 [ 784.919805] ? do_dup2+0x450/0x450 [ 784.923330] ? do_sys_open+0x2bf/0x520 [ 784.927218] ksys_ioctl+0x9b/0xc0 [ 784.930674] __x64_sys_ioctl+0x6f/0xb0 [ 784.934557] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 784.939133] do_syscall_64+0xf9/0x620 [ 784.942938] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 784.948124] RIP: 0033:0x7fe048271e07 [ 784.951821] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 784.970709] RSP: 002b:00007fe046be6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 784.978409] RAX: ffffffffffffffda RBX: 00007fe0482bb9c8 RCX: 00007fe048271e07 [ 784.985671] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 784.992926] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe046be71d0 [ 785.000178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 785.007431] R13: 0000000000000004 R14: 00000000200001b0 R15: 0000000000000002 07:26:00 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 785.045597] squashfs: SQUASHFS error: unable to read fragment index table 07:26:00 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:00 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 785.094112] erofs: read_super, device -> /dev/loop1 [ 785.099594] erofs: read_super, device -> /dev/loop5 [ 785.105323] erofs: options -> noacl, [ 785.118865] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 785.135818] erofs: root inode @ nid 0 [ 785.146489] erofs: root inode @ nid 36 [ 785.149371] erofs: bogus i_mode (0) @ nid 0 [ 785.151567] erofs: mounted on /dev/loop1 with opts: noacl. 07:26:00 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:00 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004003910000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 785.192970] erofs: read_super, device -> /dev/loop4 [ 785.210831] erofs: unmounted for /dev/loop1 [ 785.228888] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 785.242827] erofs: cannot find valid erofs superblock 07:26:01 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 785.378651] erofs: read_super, device -> /dev/loop2 [ 785.393681] erofs: read_super, device -> /dev/loop1 [ 785.398961] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 785.408240] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 785.409416] squashfs: SQUASHFS error: unable to read fragment index table [ 785.416799] erofs: cannot find valid erofs superblock 07:26:01 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 19) 07:26:01 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004003920000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 785.431976] erofs: root inode @ nid 36 [ 785.469032] erofs: bogus i_mode (0) @ nid 36 07:26:01 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:01 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000000806000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) [ 785.586712] FAULT_INJECTION: forcing a failure. [ 785.586712] name failslab, interval 1, probability 0, space 0, times 0 [ 785.609041] CPU: 0 PID: 27420 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 785.617001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 785.626344] Call Trace: [ 785.628940] dump_stack+0x1fc/0x2ef [ 785.632566] should_fail.cold+0xa/0xf [ 785.636355] ? setup_fault_attr+0x200/0x200 [ 785.640658] ? lock_acquire+0x170/0x3c0 [ 785.644630] ? dev_uevent_filter+0xd0/0xd0 [ 785.648859] __should_failslab+0x115/0x180 [ 785.653108] should_failslab+0x5/0x10 [ 785.656914] kmem_cache_alloc_trace+0x284/0x380 [ 785.661582] ? dev_uevent_filter+0xd0/0xd0 [ 785.665815] kobject_uevent_env+0x236/0x1480 [ 785.670237] lo_ioctl+0xff9/0x20e0 [ 785.673775] ? loop_set_status64+0x110/0x110 [ 785.678174] blkdev_ioctl+0x5cb/0x1a80 [ 785.682050] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 785.687413] ? blkpg_ioctl+0x9d0/0x9d0 [ 785.691295] ? mark_held_locks+0xf0/0xf0 [ 785.695339] ? mark_held_locks+0xf0/0xf0 [ 785.699385] ? debug_check_no_obj_freed+0x201/0x490 [ 785.704415] ? lock_downgrade+0x720/0x720 [ 785.708564] block_ioctl+0xe9/0x130 [ 785.712180] ? blkdev_fallocate+0x3f0/0x3f0 [ 785.716486] do_vfs_ioctl+0xcdb/0x12e0 [ 785.720358] ? lock_downgrade+0x720/0x720 [ 785.724498] ? check_preemption_disabled+0x41/0x280 [ 785.729509] ? ioctl_preallocate+0x200/0x200 [ 785.733911] ? __fget+0x356/0x510 [ 785.737359] ? do_dup2+0x450/0x450 [ 785.740895] ? do_sys_open+0x2bf/0x520 [ 785.744782] ksys_ioctl+0x9b/0xc0 [ 785.748243] __x64_sys_ioctl+0x6f/0xb0 [ 785.752122] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 785.756685] do_syscall_64+0xf9/0x620 [ 785.760469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 785.765643] RIP: 0033:0x7fe048271e07 [ 785.769346] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 785.788235] RSP: 002b:00007fe046be6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 785.795934] RAX: ffffffffffffffda RBX: 00007fe0482bb9c8 RCX: 00007fe048271e07 [ 785.803185] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 785.810440] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe046be71d0 [ 785.817693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 785.824948] R13: 0000000000000004 R14: 00000000200001b0 R15: 0000000000000002 07:26:01 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 785.846761] erofs: read_super, device -> /dev/loop4 [ 785.851898] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 785.878184] erofs: read_super, device -> /dev/loop5 [ 785.901130] erofs: options -> noacl, [ 785.905062] erofs: cannot find valid erofs superblock [ 785.927549] erofs: root inode @ nid 0 [ 785.942437] erofs: bogus i_mode (0) @ nid 0 07:26:01 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:01 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 20) [ 786.020916] squashfs: SQUASHFS error: unable to read fragment index table [ 786.034903] erofs: read_super, device -> /dev/loop1 [ 786.040310] erofs: read_super, device -> /dev/loop2 [ 786.047715] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 786.053935] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 786.063323] erofs: cannot find valid erofs superblock [ 786.069374] erofs: root inode @ nid 36 [ 786.075488] erofs: bogus i_mode (0) @ nid 36 07:26:01 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004003930000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:01 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:01 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:01 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 786.227700] erofs: read_super, device -> /dev/loop4 [ 786.242877] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 786.250065] FAULT_INJECTION: forcing a failure. [ 786.250065] name failslab, interval 1, probability 0, space 0, times 0 [ 786.271091] erofs: cannot find valid erofs superblock [ 786.277113] CPU: 1 PID: 27453 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 786.285008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 786.294364] Call Trace: [ 786.296960] dump_stack+0x1fc/0x2ef [ 786.300610] should_fail.cold+0xa/0xf [ 786.304424] ? setup_fault_attr+0x200/0x200 [ 786.308744] ? lock_acquire+0x170/0x3c0 [ 786.312707] __should_failslab+0x115/0x180 [ 786.316928] should_failslab+0x5/0x10 [ 786.320716] __kmalloc+0x2ab/0x3c0 [ 786.324243] ? kobject_get_path+0xbf/0x240 [ 786.328464] kobject_get_path+0xbf/0x240 [ 786.332509] kobject_uevent_env+0x25c/0x1480 [ 786.336905] lo_ioctl+0xff9/0x20e0 [ 786.340529] ? loop_set_status64+0x110/0x110 [ 786.344920] blkdev_ioctl+0x5cb/0x1a80 [ 786.348792] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 786.354144] ? blkpg_ioctl+0x9d0/0x9d0 [ 786.358021] ? mark_held_locks+0xf0/0xf0 [ 786.362063] ? mark_held_locks+0xf0/0xf0 [ 786.366111] ? debug_check_no_obj_freed+0x201/0x490 [ 786.371112] ? lock_downgrade+0x720/0x720 [ 786.375240] block_ioctl+0xe9/0x130 [ 786.378847] ? blkdev_fallocate+0x3f0/0x3f0 [ 786.383149] do_vfs_ioctl+0xcdb/0x12e0 [ 786.387020] ? lock_downgrade+0x720/0x720 [ 786.391156] ? check_preemption_disabled+0x41/0x280 [ 786.396154] ? ioctl_preallocate+0x200/0x200 [ 786.400564] ? __fget+0x356/0x510 [ 786.404029] ? do_dup2+0x450/0x450 [ 786.407554] ? do_sys_open+0x2bf/0x520 [ 786.411440] ksys_ioctl+0x9b/0xc0 [ 786.414885] __x64_sys_ioctl+0x6f/0xb0 [ 786.418768] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 786.423335] do_syscall_64+0xf9/0x620 [ 786.427126] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 786.432299] RIP: 0033:0x7fe048271e07 [ 786.436775] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 786.456974] RSP: 002b:00007fe046be6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 786.464670] RAX: ffffffffffffffda RBX: 00007fe0482bb9c8 RCX: 00007fe048271e07 07:26:02 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 786.471922] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 786.479175] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe046be71d0 [ 786.486427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 786.493676] R13: 0000000000000004 R14: 00000000200001b0 R15: 0000000000000002 07:26:02 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004003940000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 786.570823] erofs: read_super, device -> /dev/loop5 [ 786.576053] erofs: options -> noacl, [ 786.581367] erofs: root inode @ nid 0 [ 786.587335] erofs: bogus i_mode (0) @ nid 0 [ 786.644129] erofs: read_super, device -> /dev/loop1 [ 786.650403] squashfs: SQUASHFS error: unable to read fragment index table [ 786.654124] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 786.665944] erofs: root inode @ nid 36 [ 786.670053] erofs: bogus i_mode (0) @ nid 36 [ 786.739205] erofs: read_super, device -> /dev/loop2 [ 786.745575] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 786.753057] erofs: cannot find valid erofs superblock 07:26:02 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:02 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c0410000", 0x8, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:02 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 21) 07:26:02 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004003950000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 786.808750] erofs: read_super, device -> /dev/loop4 [ 786.821898] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 786.837085] erofs: cannot find valid erofs superblock 07:26:02 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:02 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 786.967115] squashfs: SQUASHFS error: unable to read fragment index table [ 786.974593] FAULT_INJECTION: forcing a failure. [ 786.974593] name failslab, interval 1, probability 0, space 0, times 0 [ 786.991719] CPU: 0 PID: 27503 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 786.999610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 787.008948] Call Trace: [ 787.011522] dump_stack+0x1fc/0x2ef [ 787.015233] should_fail.cold+0xa/0xf [ 787.019015] ? setup_fault_attr+0x200/0x200 [ 787.023319] ? lock_acquire+0x170/0x3c0 [ 787.027278] __should_failslab+0x115/0x180 [ 787.031500] should_failslab+0x5/0x10 [ 787.035370] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 787.040460] __kmalloc_node_track_caller+0x38/0x70 [ 787.045381] __alloc_skb+0xae/0x560 [ 787.048992] alloc_uevent_skb+0x7b/0x210 [ 787.053045] kobject_uevent_env+0xa90/0x1480 [ 787.057457] lo_ioctl+0xff9/0x20e0 [ 787.060992] ? loop_set_status64+0x110/0x110 [ 787.065384] blkdev_ioctl+0x5cb/0x1a80 [ 787.069273] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 787.074619] ? blkpg_ioctl+0x9d0/0x9d0 [ 787.078497] ? mark_held_locks+0xf0/0xf0 [ 787.082549] ? mark_held_locks+0xf0/0xf0 [ 787.086612] ? debug_check_no_obj_freed+0x201/0x490 [ 787.091613] ? lock_downgrade+0x720/0x720 [ 787.095742] block_ioctl+0xe9/0x130 [ 787.099359] ? blkdev_fallocate+0x3f0/0x3f0 [ 787.103665] do_vfs_ioctl+0xcdb/0x12e0 [ 787.107539] ? lock_downgrade+0x720/0x720 [ 787.111667] ? check_preemption_disabled+0x41/0x280 [ 787.116663] ? ioctl_preallocate+0x200/0x200 [ 787.121069] ? __fget+0x356/0x510 [ 787.124518] ? do_dup2+0x450/0x450 [ 787.128048] ? do_sys_open+0x2bf/0x520 [ 787.131925] ksys_ioctl+0x9b/0xc0 [ 787.135384] __x64_sys_ioctl+0x6f/0xb0 [ 787.139266] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 787.143833] do_syscall_64+0xf9/0x620 [ 787.147621] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 787.152795] RIP: 0033:0x7fe048271e07 [ 787.156488] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 787.175371] RSP: 002b:00007fe046be6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 787.183066] RAX: ffffffffffffffda RBX: 00007fe0482bb9c8 RCX: 00007fe048271e07 [ 787.190320] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 787.197575] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe046be71d0 [ 787.204830] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 787.212084] R13: 0000000000000004 R14: 00000000200001b0 R15: 0000000000000002 [ 787.263612] erofs: read_super, device -> /dev/loop5 [ 787.268644] erofs: options -> noacl, [ 787.272782] erofs: root inode @ nid 0 [ 787.277334] erofs: bogus i_mode (0) @ nid 0 [ 787.296024] erofs: read_super, device -> /dev/loop4 [ 787.301050] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 787.308313] erofs: read_super, device -> /dev/loop1 07:26:03 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 787.312068] erofs: cannot find valid erofs superblock [ 787.314410] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 787.328603] erofs: read_super, device -> /dev/loop2 [ 787.333747] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 787.333982] erofs: cannot find valid erofs superblock [ 787.346832] erofs: root inode @ nid 36 [ 787.351019] erofs: mounted on /dev/loop1 with opts: noacl. 07:26:03 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:03 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004003960000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:03 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 22) 07:26:03 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:03 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:03 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004003970000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 787.497070] squashfs: SQUASHFS error: unable to read fragment index table [ 787.504146] erofs: unmounted for /dev/loop1 [ 787.597045] FAULT_INJECTION: forcing a failure. [ 787.597045] name failslab, interval 1, probability 0, space 0, times 0 [ 787.608396] CPU: 1 PID: 27535 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 787.616293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 787.625628] Call Trace: [ 787.628220] dump_stack+0x1fc/0x2ef [ 787.631831] should_fail.cold+0xa/0xf [ 787.635617] ? setup_fault_attr+0x200/0x200 [ 787.639921] ? lock_acquire+0x170/0x3c0 [ 787.643879] __should_failslab+0x115/0x180 [ 787.648109] should_failslab+0x5/0x10 [ 787.651898] __kmalloc+0x2ab/0x3c0 [ 787.655419] ? kobject_get_path+0xbf/0x240 [ 787.659637] kobject_get_path+0xbf/0x240 [ 787.663681] kobject_uevent_env+0x25c/0x1480 [ 787.668081] lo_ioctl+0xff9/0x20e0 [ 787.671694] ? loop_set_status64+0x110/0x110 [ 787.676085] blkdev_ioctl+0x5cb/0x1a80 [ 787.679968] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 787.685312] ? blkpg_ioctl+0x9d0/0x9d0 [ 787.689180] ? mark_held_locks+0xf0/0xf0 [ 787.693221] ? mark_held_locks+0xf0/0xf0 [ 787.697263] ? debug_check_no_obj_freed+0x201/0x490 [ 787.702264] ? lock_downgrade+0x720/0x720 [ 787.706398] block_ioctl+0xe9/0x130 [ 787.710018] ? blkdev_fallocate+0x3f0/0x3f0 [ 787.714327] do_vfs_ioctl+0xcdb/0x12e0 [ 787.718215] ? lock_downgrade+0x720/0x720 [ 787.722361] ? check_preemption_disabled+0x41/0x280 [ 787.727367] ? ioctl_preallocate+0x200/0x200 [ 787.731757] ? __fget+0x356/0x510 [ 787.735191] ? do_dup2+0x450/0x450 [ 787.738713] ? do_sys_open+0x2bf/0x520 [ 787.742584] ksys_ioctl+0x9b/0xc0 [ 787.746020] __x64_sys_ioctl+0x6f/0xb0 [ 787.749891] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 787.754452] do_syscall_64+0xf9/0x620 [ 787.758238] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 787.763413] RIP: 0033:0x7fe048271e07 [ 787.767116] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 787.786004] RSP: 002b:00007fe046be6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 787.793691] RAX: ffffffffffffffda RBX: 00007fe0482bb9c8 RCX: 00007fe048271e07 [ 787.800941] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 787.808195] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe046be71d0 [ 787.815449] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 787.822708] R13: 0000000000000004 R14: 00000000200001b0 R15: 0000000000000002 07:26:03 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 787.853643] erofs: read_super, device -> /dev/loop5 [ 787.858678] erofs: options -> noacl, [ 787.865270] erofs: read_super, device -> /dev/loop2 [ 787.882512] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 787.898116] erofs: root inode @ nid 0 07:26:03 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004003980000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 787.916260] erofs: read_super, device -> /dev/loop1 [ 787.918559] erofs: bogus i_mode (0) @ nid 0 [ 787.921667] erofs: read_super, device -> /dev/loop4 [ 787.931565] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 787.931731] erofs: cannot find valid erofs superblock [ 787.939039] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 787.951611] erofs: root inode @ nid 36 [ 787.956065] erofs: cannot find valid erofs superblock [ 787.961994] erofs: bogus i_mode (0) @ nid 36 07:26:03 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:03 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000", 0x20, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:03 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 23) 07:26:03 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 788.165157] squashfs: SQUASHFS error: unable to read fragment index table 07:26:04 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:04 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004003990000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 788.274683] erofs: read_super, device -> /dev/loop2 [ 788.292643] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 788.304189] erofs: cannot find valid erofs superblock 07:26:04 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 788.346765] squashfs: SQUASHFS error: unable to read fragment index table [ 788.352903] erofs: read_super, device -> /dev/loop4 [ 788.360174] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 788.368670] erofs: read_super, device -> /dev/loop1 [ 788.376405] FAULT_INJECTION: forcing a failure. [ 788.376405] name failslab, interval 1, probability 0, space 0, times 0 [ 788.376670] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 788.391051] erofs: root inode @ nid 36 [ 788.397137] erofs: root inode @ nid 36 [ 788.402657] erofs: bogus i_mode (0) @ nid 36 [ 788.403239] erofs: mounted on /dev/loop4 with opts: noacl. [ 788.417541] CPU: 1 PID: 27591 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 788.425414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 788.434753] Call Trace: [ 788.437335] dump_stack+0x1fc/0x2ef [ 788.440955] should_fail.cold+0xa/0xf [ 788.444741] ? setup_fault_attr+0x200/0x200 [ 788.449054] ? lock_acquire+0x170/0x3c0 [ 788.453033] __should_failslab+0x115/0x180 [ 788.457261] should_failslab+0x5/0x10 [ 788.461049] kmem_cache_alloc+0x277/0x370 [ 788.465182] skb_clone+0x151/0x3d0 [ 788.468706] netlink_broadcast_filtered+0x8e5/0xbc0 [ 788.473707] netlink_broadcast+0x35/0x40 [ 788.477753] kobject_uevent_env+0xa56/0x1480 [ 788.482151] lo_ioctl+0xff9/0x20e0 [ 788.485687] ? loop_set_status64+0x110/0x110 [ 788.490077] blkdev_ioctl+0x5cb/0x1a80 [ 788.493956] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 788.499310] ? blkpg_ioctl+0x9d0/0x9d0 [ 788.503187] ? mark_held_locks+0xf0/0xf0 [ 788.507234] ? mark_held_locks+0xf0/0xf0 [ 788.511290] ? debug_check_no_obj_freed+0x201/0x490 [ 788.516320] ? lock_downgrade+0x720/0x720 [ 788.520454] block_ioctl+0xe9/0x130 [ 788.524069] ? blkdev_fallocate+0x3f0/0x3f0 [ 788.528382] do_vfs_ioctl+0xcdb/0x12e0 [ 788.532262] ? lock_downgrade+0x720/0x720 [ 788.536399] ? check_preemption_disabled+0x41/0x280 [ 788.541400] ? ioctl_preallocate+0x200/0x200 [ 788.545792] ? __fget+0x356/0x510 [ 788.549225] ? do_dup2+0x450/0x450 [ 788.552764] ? do_sys_open+0x2bf/0x520 [ 788.556635] ksys_ioctl+0x9b/0xc0 [ 788.560073] __x64_sys_ioctl+0x6f/0xb0 [ 788.563957] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 788.568526] do_syscall_64+0xf9/0x620 [ 788.572322] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 788.577491] RIP: 0033:0x7fe048271e07 [ 788.581185] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 788.600074] RSP: 002b:00007fe046be6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 788.607786] RAX: ffffffffffffffda RBX: 00007fe0482bb9c8 RCX: 00007fe048271e07 [ 788.615048] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 788.622299] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe046be71d0 [ 788.629552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 788.636806] R13: 0000000000000004 R14: 00000000200001b0 R15: 0000000000000002 [ 788.662736] erofs: read_super, device -> /dev/loop5 [ 788.668265] erofs: options -> noacl, [ 788.672269] erofs: root inode @ nid 0 [ 788.678651] erofs: bogus i_mode (0) @ nid 0 07:26:04 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 788.733649] erofs: unmounted for /dev/loop4 07:26:04 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:04 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:04 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 24) 07:26:04 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040039a0000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 788.851956] erofs: read_super, device -> /dev/loop2 [ 788.865973] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 788.888052] erofs: cannot find valid erofs superblock 07:26:04 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 788.938360] squashfs: SQUASHFS error: unable to read fragment index table [ 788.975656] erofs: read_super, device -> /dev/loop4 [ 788.981242] FAULT_INJECTION: forcing a failure. [ 788.981242] name failslab, interval 1, probability 0, space 0, times 0 [ 788.995808] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 789.006094] CPU: 0 PID: 27624 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 789.013712] erofs: cannot find valid erofs superblock [ 789.013981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 789.028540] Call Trace: [ 789.031124] dump_stack+0x1fc/0x2ef [ 789.034737] should_fail.cold+0xa/0xf [ 789.038520] ? setup_fault_attr+0x200/0x200 [ 789.042829] ? lock_acquire+0x170/0x3c0 [ 789.046812] __should_failslab+0x115/0x180 [ 789.051043] should_failslab+0x5/0x10 [ 789.054841] kmem_cache_alloc+0x277/0x370 [ 789.058984] skb_clone+0x151/0x3d0 [ 789.062524] netlink_broadcast_filtered+0x8e5/0xbc0 [ 789.067549] netlink_broadcast+0x35/0x40 [ 789.071608] kobject_uevent_env+0xa56/0x1480 [ 789.076009] lo_ioctl+0xff9/0x20e0 [ 789.079534] ? loop_set_status64+0x110/0x110 [ 789.083941] blkdev_ioctl+0x5cb/0x1a80 [ 789.087837] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 789.093192] ? blkpg_ioctl+0x9d0/0x9d0 [ 789.097064] ? mark_held_locks+0xf0/0xf0 [ 789.101106] ? mark_held_locks+0xf0/0xf0 [ 789.105164] ? debug_check_no_obj_freed+0x201/0x490 [ 789.110183] ? lock_downgrade+0x720/0x720 [ 789.114326] block_ioctl+0xe9/0x130 [ 789.117938] ? blkdev_fallocate+0x3f0/0x3f0 [ 789.122250] do_vfs_ioctl+0xcdb/0x12e0 [ 789.126136] ? lock_downgrade+0x720/0x720 [ 789.130279] ? check_preemption_disabled+0x41/0x280 [ 789.135365] ? ioctl_preallocate+0x200/0x200 [ 789.139756] ? __fget+0x356/0x510 [ 789.143191] ? do_dup2+0x450/0x450 [ 789.146735] ? do_sys_open+0x2bf/0x520 [ 789.150616] ksys_ioctl+0x9b/0xc0 [ 789.154053] __x64_sys_ioctl+0x6f/0xb0 [ 789.157923] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 789.162485] do_syscall_64+0xf9/0x620 [ 789.166284] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 789.171461] RIP: 0033:0x7fe048271e07 [ 789.175153] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 789.194037] RSP: 002b:00007fe046be6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 789.201724] RAX: ffffffffffffffda RBX: 00007fe0482bb9c8 RCX: 00007fe048271e07 [ 789.208980] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 789.216239] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe046be71d0 [ 789.223495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 789.230756] R13: 0000000000000004 R14: 00000000200001b0 R15: 0000000000000002 [ 789.284846] erofs: read_super, device -> /dev/loop1 [ 789.290167] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 789.298614] erofs: root inode @ nid 36 [ 789.302942] erofs: bogus i_mode (0) @ nid 36 [ 789.315250] erofs: read_super, device -> /dev/loop5 [ 789.324705] erofs: read_super, device -> /dev/loop2 07:26:05 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000006c06000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:05 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004026b10000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:05 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 789.343682] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 789.354120] erofs: options -> noacl, [ 789.365956] erofs: root inode @ nid 0 [ 789.379936] erofs: cannot find valid erofs superblock [ 789.380984] erofs: bogus i_mode (0) @ nid 0 07:26:05 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:05 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040c0ed0000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:05 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000", 0x4, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 789.535216] erofs: read_super, device -> /dev/loop4 [ 789.540246] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 789.549305] squashfs: SQUASHFS error: unable to read fragment index table [ 789.554497] erofs: cannot find valid erofs superblock 07:26:05 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 25) 07:26:05 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:05 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 789.676967] erofs: read_super, device -> /dev/loop2 [ 789.682023] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 789.712204] erofs: cannot find valid erofs superblock 07:26:05 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f00400fff0000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 789.755131] FAULT_INJECTION: forcing a failure. [ 789.755131] name failslab, interval 1, probability 0, space 0, times 0 [ 789.770462] CPU: 1 PID: 27678 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 789.778338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 789.787677] Call Trace: [ 789.790258] dump_stack+0x1fc/0x2ef [ 789.793873] should_fail.cold+0xa/0xf [ 789.797666] ? setup_fault_attr+0x200/0x200 [ 789.801975] ? lock_acquire+0x170/0x3c0 [ 789.806002] __should_failslab+0x115/0x180 [ 789.810221] should_failslab+0x5/0x10 [ 789.814005] kmem_cache_alloc_trace+0x284/0x380 [ 789.818656] ? wait_for_completion_io+0x10/0x10 [ 789.823307] ? kobj_ns_initial+0x90/0x90 [ 789.827354] call_usermodehelper_setup+0x84/0x300 [ 789.832187] kobject_uevent_env+0xe83/0x1480 [ 789.836594] lo_ioctl+0xff9/0x20e0 [ 789.840141] ? loop_set_status64+0x110/0x110 [ 789.844535] blkdev_ioctl+0x5cb/0x1a80 [ 789.848406] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 789.853762] ? blkpg_ioctl+0x9d0/0x9d0 [ 789.857649] ? mark_held_locks+0xf0/0xf0 [ 789.861701] ? mark_held_locks+0xf0/0xf0 [ 789.865753] ? debug_check_no_obj_freed+0x201/0x490 [ 789.870756] ? lock_downgrade+0x720/0x720 [ 789.874924] block_ioctl+0xe9/0x130 [ 789.878531] ? blkdev_fallocate+0x3f0/0x3f0 [ 789.882845] do_vfs_ioctl+0xcdb/0x12e0 [ 789.886726] ? lock_downgrade+0x720/0x720 [ 789.890858] ? check_preemption_disabled+0x41/0x280 [ 789.895857] ? ioctl_preallocate+0x200/0x200 [ 789.900249] ? __fget+0x356/0x510 [ 789.903684] ? do_dup2+0x450/0x450 [ 789.907216] ? do_sys_open+0x2bf/0x520 [ 789.911099] ksys_ioctl+0x9b/0xc0 [ 789.914542] __x64_sys_ioctl+0x6f/0xb0 [ 789.918410] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 789.922974] do_syscall_64+0xf9/0x620 [ 789.926760] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 789.931940] RIP: 0033:0x7fe048271e07 [ 789.935654] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 789.954539] RSP: 002b:00007fe046be6f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 789.962229] RAX: ffffffffffffffda RBX: 00007fe0482bb9c8 RCX: 00007fe048271e07 [ 789.969487] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 789.976741] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe046be71d0 [ 789.984005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 789.991257] R13: 0000000000000004 R14: 00000000200001b0 R15: 0000000000000002 [ 790.020179] erofs: read_super, device -> /dev/loop5 [ 790.025580] erofs: options -> noacl, [ 790.039319] erofs: root inode @ nid 0 [ 790.043903] erofs: bogus i_mode (0) @ nid 0 [ 790.064404] erofs: read_super, device -> /dev/loop1 07:26:05 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000", 0x20, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 790.069626] erofs: read_super, device -> /dev/loop4 [ 790.074052] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 790.077551] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 790.085845] squashfs: SQUASHFS error: unable to read fragment index table [ 790.092816] erofs: cannot find valid erofs superblock [ 790.101200] erofs: root inode @ nid 36 [ 790.105785] erofs: bogus i_mode (0) @ nid 36 07:26:05 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 26) 07:26:06 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000", 0x4, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:06 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c002400", 0x10, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:06 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000007a06000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) [ 790.292170] FAULT_INJECTION: forcing a failure. [ 790.292170] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 790.304002] CPU: 1 PID: 27707 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 790.311887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 790.321241] Call Trace: [ 790.323837] dump_stack+0x1fc/0x2ef [ 790.327479] should_fail.cold+0xa/0xf [ 790.331294] ? setup_fault_attr+0x200/0x200 [ 790.335631] ? __mutex_unlock_slowpath+0xea/0x610 [ 790.340483] __alloc_pages_nodemask+0x239/0x2890 [ 790.345258] ? __lock_acquire+0x6de/0x3ff0 [ 790.349506] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 790.354353] ? blkdev_ioctl+0x11a/0x1a80 [ 790.358422] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 790.363786] ? blkpg_ioctl+0x9d0/0x9d0 [ 790.367686] ? debug_check_no_obj_freed+0x201/0x490 [ 790.372721] ? lock_downgrade+0x720/0x720 [ 790.376884] cache_grow_begin+0xa4/0x8a0 [ 790.380947] ? setup_fault_attr+0x200/0x200 [ 790.385260] ? lock_acquire+0x170/0x3c0 [ 790.389235] cache_alloc_refill+0x273/0x340 [ 790.393566] kmem_cache_alloc+0x346/0x370 [ 790.397725] getname_flags+0xce/0x590 [ 790.401535] do_mkdirat+0x8d/0x2d0 [ 790.402788] erofs: read_super, device -> /dev/loop2 [ 790.405077] ? __ia32_sys_mknod+0x120/0x120 [ 790.405096] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 790.405113] ? trace_hardirqs_off_caller+0x6e/0x210 [ 790.405128] ? do_syscall_64+0x21/0x620 [ 790.405144] do_syscall_64+0xf9/0x620 [ 790.414481] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, 07:26:06 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000200000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 790.419805] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 790.419818] RIP: 0033:0x7fe048271157 [ 790.419833] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 790.438031] erofs: root inode @ nid 36 [ 790.439383] RSP: 002b:00007fe046be6f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 790.439398] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fe048271157 [ 790.439406] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 790.439414] RBP: 00007fe046be7020 R08: 0000000000000000 R09: 00007fe046be71d0 [ 790.439426] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 790.447039] erofs: mounted on /dev/loop2 with opts: noacl. [ 790.448291] R13: 0000000020000100 R14: 00007fe046be6fe0 R15: 0000000020000140 [ 790.486556] erofs: read_super, device -> /dev/loop5 [ 790.486564] erofs: options -> noacl, [ 790.492106] erofs: read_super, device -> /dev/loop4 [ 790.512376] squashfs: SQUASHFS error: unable to read fragment index table 07:26:06 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:06 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 27) [ 790.520557] erofs: root inode @ nid 0 [ 790.547143] erofs: bogus i_mode (0) @ nid 0 [ 790.555579] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 790.562383] squashfs: SQUASHFS error: unable to read xattr id index table 07:26:06 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000", 0x20, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 790.596535] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 790.604194] erofs: unmounted for /dev/loop2 [ 790.609580] erofs: root inode @ nid 36 [ 790.615012] erofs: mounted on /dev/loop4 with opts: noacl. [ 790.634485] erofs: read_super, device -> /dev/loop1 [ 790.639655] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, 07:26:06 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000400000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 790.650978] erofs: root inode @ nid 36 [ 790.655995] erofs: bogus i_mode (0) @ nid 36 07:26:06 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000", 0x4, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 790.728220] squashfs: SQUASHFS error: unable to read fragment index table 07:26:06 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c002400", 0x10, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 790.776032] erofs: read_super, device -> /dev/loop2 [ 790.781291] erofs: unmounted for /dev/loop4 [ 790.782783] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 790.803332] erofs: root inode @ nid 36 [ 790.807430] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:06 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 790.883945] FAULT_INJECTION: forcing a failure. [ 790.883945] name failslab, interval 1, probability 0, space 0, times 0 [ 790.896345] erofs: read_super, device -> /dev/loop1 [ 790.901386] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 790.904749] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 790.917277] erofs: root inode @ nid 36 [ 790.923788] erofs: bogus i_mode (0) @ nid 36 [ 790.924821] erofs: unmounted for /dev/loop2 [ 790.928493] CPU: 0 PID: 27749 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 790.940448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 790.949808] Call Trace: [ 790.952385] dump_stack+0x1fc/0x2ef [ 790.956027] should_fail.cold+0xa/0xf [ 790.959906] ? setup_fault_attr+0x200/0x200 [ 790.964213] ? lock_acquire+0x170/0x3c0 [ 790.968179] __should_failslab+0x115/0x180 [ 790.972422] should_failslab+0x5/0x10 [ 790.976208] kmem_cache_alloc+0x277/0x370 [ 790.980343] __d_alloc+0x2b/0xa10 [ 790.983799] d_alloc+0x4a/0x230 [ 790.987075] __lookup_hash+0xc8/0x180 [ 790.990871] filename_create+0x186/0x490 [ 790.994928] ? kern_path_mountpoint+0x40/0x40 [ 790.999423] ? strncpy_from_user+0x2a2/0x350 [ 791.003828] ? getname_flags+0x25b/0x590 [ 791.007900] do_mkdirat+0xa0/0x2d0 [ 791.011438] ? __ia32_sys_mknod+0x120/0x120 [ 791.015761] ? trace_hardirqs_off_caller+0x6e/0x210 [ 791.020769] ? do_syscall_64+0x21/0x620 [ 791.024819] do_syscall_64+0xf9/0x620 [ 791.028613] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 791.033789] RIP: 0033:0x7fe048271157 [ 791.037487] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 791.056381] RSP: 002b:00007fe046be6f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 791.064078] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fe048271157 [ 791.071337] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 07:26:06 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:06 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 791.078597] RBP: 00007fe046be7020 R08: 0000000000000000 R09: 00007fe046be71d0 [ 791.085935] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 791.093200] R13: 0000000020000100 R14: 00007fe046be6fe0 R15: 0000000020000140 [ 791.120592] squashfs: SQUASHFS error: unable to read xattr id index table [ 791.218981] erofs: read_super, device -> /dev/loop4 07:26:07 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 28) 07:26:07 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000001000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:07 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 791.240944] squashfs: SQUASHFS error: unable to read fragment index table [ 791.256375] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 791.278491] erofs: root inode @ nid 36 [ 791.282691] erofs: mounted on /dev/loop4 with opts: noacl. [ 791.318372] erofs: read_super, device -> /dev/loop2 [ 791.328777] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 791.329299] FAULT_INJECTION: forcing a failure. [ 791.329299] name failslab, interval 1, probability 0, space 0, times 0 [ 791.337659] erofs: cannot find valid erofs superblock [ 791.353461] erofs: read_super, device -> /dev/loop1 07:26:07 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 791.370561] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 791.398112] erofs: unmounted for /dev/loop4 [ 791.427943] erofs: root inode @ nid 36 [ 791.437502] erofs: mounted on /dev/loop1 with opts: noacl. [ 791.444960] CPU: 1 PID: 27781 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 791.452853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 791.462199] Call Trace: [ 791.464796] dump_stack+0x1fc/0x2ef [ 791.468431] should_fail.cold+0xa/0xf [ 791.472238] ? setup_fault_attr+0x200/0x200 [ 791.476556] __should_failslab+0x115/0x180 [ 791.480777] should_failslab+0x5/0x10 [ 791.484593] kmem_cache_alloc+0x277/0x370 [ 791.488745] ? ext4_sync_fs+0x8d0/0x8d0 [ 791.492729] ext4_alloc_inode+0x1a/0x630 [ 791.496796] ? ext4_sync_fs+0x8d0/0x8d0 [ 791.500761] alloc_inode+0x5d/0x180 [ 791.504367] new_inode+0x1d/0xf0 [ 791.507726] __ext4_new_inode+0x400/0x5a20 [ 791.511957] ? putname+0xe1/0x120 [ 791.515393] ? do_mkdirat+0xa0/0x2d0 [ 791.519092] ? ext4_free_inode+0x1780/0x1780 [ 791.523484] ? debug_check_no_obj_freed+0x201/0x490 [ 791.528480] ? __dquot_initialize+0x298/0xb70 [ 791.532956] ? lock_acquire+0x170/0x3c0 [ 791.536925] ? dquot_initialize_needed+0x290/0x290 [ 791.541836] ? trace_hardirqs_off+0x64/0x200 [ 791.546225] ? common_perm+0x4be/0x800 [ 791.550095] ext4_mkdir+0x396/0xe10 [ 791.553720] ? putname+0xe1/0x120 [ 791.557159] ? ext4_init_dot_dotdot+0x600/0x600 [ 791.561808] ? generic_permission+0x116/0x4d0 [ 791.566288] ? security_inode_permission+0xc5/0xf0 [ 791.571197] ? inode_permission.part.0+0x10c/0x450 [ 791.576110] vfs_mkdir+0x508/0x7a0 [ 791.579639] do_mkdirat+0x262/0x2d0 [ 791.583247] ? __ia32_sys_mknod+0x120/0x120 [ 791.587552] ? trace_hardirqs_off_caller+0x6e/0x210 [ 791.592546] ? do_syscall_64+0x21/0x620 [ 791.596498] do_syscall_64+0xf9/0x620 [ 791.600292] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 791.605471] RIP: 0033:0x7fe048271157 [ 791.609166] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 791.628044] RSP: 002b:00007fe046be6f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 791.635732] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fe048271157 [ 791.642994] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 791.650265] RBP: 00007fe046be7020 R08: 0000000000000000 R09: 00007fe046be71d0 [ 791.657525] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 791.664774] R13: 0000000020000100 R14: 00007fe046be6fe0 R15: 0000000020000140 07:26:07 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:07 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000", 0x4, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:07 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 29) [ 791.727806] erofs: read_super, device -> /dev/loop4 [ 791.732851] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 791.757849] squashfs: SQUASHFS error: unable to read fragment index table [ 791.765099] erofs: unmounted for /dev/loop1 [ 791.772747] erofs: cannot find valid erofs superblock [ 791.794730] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 791.805985] squashfs: SQUASHFS error: unable to read xattr id index table 07:26:07 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040ffff1f00000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:07 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 791.967200] erofs: read_super, device -> /dev/loop2 [ 791.972271] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, 07:26:07 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 792.010590] FAULT_INJECTION: forcing a failure. [ 792.010590] name failslab, interval 1, probability 0, space 0, times 0 [ 792.057663] CPU: 1 PID: 27818 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 792.065570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 792.066449] erofs: cannot find valid erofs superblock [ 792.074920] Call Trace: [ 792.082813] dump_stack+0x1fc/0x2ef [ 792.086455] should_fail.cold+0xa/0xf [ 792.090268] ? setup_fault_attr+0x200/0x200 [ 792.094593] ? __lock_acquire+0x6de/0x3ff0 [ 792.098841] __should_failslab+0x115/0x180 [ 792.103081] should_failslab+0x5/0x10 [ 792.106874] __kmalloc+0x2ab/0x3c0 [ 792.110403] ? ext4_find_extent+0x9bb/0xc70 [ 792.114716] ext4_find_extent+0x9bb/0xc70 [ 792.118852] ext4_ext_map_blocks+0x1c0/0x7390 [ 792.123340] ? __lock_acquire+0x6de/0x3ff0 [ 792.127566] ? __lock_acquire+0x6de/0x3ff0 [ 792.131789] ? mark_held_locks+0xf0/0xf0 [ 792.135838] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 792.141183] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 792.146364] ? mark_held_locks+0xf0/0xf0 [ 792.150427] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 792.155269] ? ext4_es_lookup_extent+0x375/0xb60 [ 792.160009] ? lock_downgrade+0x720/0x720 [ 792.164136] ? lock_acquire+0x170/0x3c0 [ 792.168094] ? check_preemption_disabled+0x41/0x280 [ 792.173099] ? lock_acquire+0x170/0x3c0 [ 792.177067] ? ext4_map_blocks+0x33e/0x1a50 [ 792.181381] ext4_map_blocks+0xd88/0x1a50 [ 792.185515] ? check_preemption_disabled+0x41/0x280 [ 792.190534] ? ext4_issue_zeroout+0x160/0x160 [ 792.195033] ? __brelse+0x84/0xa0 [ 792.198485] ? __ext4_new_inode+0x2eb/0x5a20 [ 792.202906] ext4_getblk+0xad/0x4f0 [ 792.206533] ? ext4_iomap_begin+0xe00/0xe00 [ 792.210850] ? ext4_free_inode+0x1780/0x1780 [ 792.215330] ? debug_check_no_obj_freed+0x201/0x490 [ 792.220338] ? __dquot_initialize+0x298/0xb70 [ 792.224825] ext4_bread+0x7c/0x210 [ 792.228361] ? ext4_getblk+0x4f0/0x4f0 [ 792.232238] ? dquot_initialize_needed+0x290/0x290 [ 792.237160] ? trace_hardirqs_off+0x64/0x200 [ 792.241568] ext4_append+0x155/0x370 [ 792.245286] ext4_mkdir+0x5bd/0xe10 [ 792.248909] ? ext4_init_dot_dotdot+0x600/0x600 [ 792.253574] ? generic_permission+0x116/0x4d0 [ 792.258056] ? inode_permission.part.0+0x10c/0x450 [ 792.262975] vfs_mkdir+0x508/0x7a0 [ 792.266503] do_mkdirat+0x262/0x2d0 [ 792.270114] ? __ia32_sys_mknod+0x120/0x120 [ 792.274441] ? trace_hardirqs_off_caller+0x6e/0x210 [ 792.279466] ? do_syscall_64+0x21/0x620 [ 792.283437] do_syscall_64+0xf9/0x620 [ 792.287240] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 792.292423] RIP: 0033:0x7fe048271157 [ 792.296130] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 792.315029] RSP: 002b:00007fe046be6f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 792.322732] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fe048271157 [ 792.329984] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 792.337244] RBP: 00007fe046be7020 R08: 0000000000000000 R09: 00007fe046be71d0 [ 792.344504] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 792.351761] R13: 0000000020000100 R14: 00007fe046be6fe0 R15: 0000000020000140 07:26:08 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:08 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000002000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 792.442638] erofs: read_super, device -> /dev/loop1 [ 792.449204] erofs: read_super, device -> /dev/loop5 [ 792.469263] erofs: read_super, device -> /dev/loop4 [ 792.477648] erofs: options -> noacl, [ 792.481559] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, 07:26:08 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 30) [ 792.491466] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 792.499382] erofs: root inode @ nid 0 [ 792.503760] erofs: bogus i_mode (0) @ nid 0 [ 792.508801] erofs: root inode @ nid 36 [ 792.519412] squashfs: SQUASHFS error: unable to read fragment index table [ 792.522876] erofs: bogus i_mode (0) @ nid 36 [ 792.532124] erofs: cannot find valid erofs superblock 07:26:08 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:08 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 792.618248] erofs: read_super, device -> /dev/loop2 07:26:08 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000", 0x4, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:08 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c002400", 0x10, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 792.648628] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 792.657568] erofs: cannot find valid erofs superblock [ 792.672037] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 792.681441] squashfs: SQUASHFS error: unable to read xattr id index table [ 792.755721] FAULT_INJECTION: forcing a failure. [ 792.755721] name failslab, interval 1, probability 0, space 0, times 0 [ 792.767598] CPU: 1 PID: 27859 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 792.771697] squashfs: SQUASHFS error: unable to read fragment index table [ 792.775488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 792.791851] Call Trace: [ 792.794432] dump_stack+0x1fc/0x2ef [ 792.798052] should_fail.cold+0xa/0xf [ 792.801843] ? setup_fault_attr+0x200/0x200 [ 792.806154] ? __es_tree_search.isra.0+0x1af/0x210 [ 792.811072] __should_failslab+0x115/0x180 [ 792.815300] should_failslab+0x5/0x10 [ 792.819088] kmem_cache_alloc+0x3f/0x370 [ 792.823138] __es_insert_extent+0x39b/0x13b0 [ 792.827535] ? lock_acquire+0x170/0x3c0 [ 792.831491] ? ext4_es_insert_extent+0x17e/0x5e0 [ 792.836243] ext4_es_insert_extent+0x22e/0x5e0 [ 792.840817] ? lock_downgrade+0x720/0x720 [ 792.844953] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 792.850743] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 792.855751] ? ext4_es_find_delayed_extent_range+0x7d9/0x9f0 [ 792.861537] ext4_ext_map_blocks+0x2129/0x7390 [ 792.866108] ? __lock_acquire+0x6de/0x3ff0 [ 792.870421] ? __lock_acquire+0x6de/0x3ff0 [ 792.874653] ? mark_held_locks+0xf0/0xf0 [ 792.878701] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 792.884050] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 792.889225] ? mark_held_locks+0xf0/0xf0 [ 792.893275] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 792.898106] ? ext4_es_lookup_extent+0x375/0xb60 [ 792.902852] ? check_preemption_disabled+0x41/0x280 [ 792.907856] ? lock_acquire+0x170/0x3c0 [ 792.911816] ? ext4_map_blocks+0x33e/0x1a50 [ 792.916130] ext4_map_blocks+0xd88/0x1a50 [ 792.920272] ? check_preemption_disabled+0x41/0x280 [ 792.925274] ? ext4_issue_zeroout+0x160/0x160 [ 792.929757] ? __brelse+0x84/0xa0 [ 792.933196] ? __ext4_new_inode+0x2eb/0x5a20 [ 792.937598] ext4_getblk+0xad/0x4f0 [ 792.941215] ? ext4_iomap_begin+0xe00/0xe00 [ 792.945609] ? ext4_free_inode+0x1780/0x1780 [ 792.950000] ? debug_check_no_obj_freed+0x201/0x490 [ 792.955020] ? __dquot_initialize+0x298/0xb70 [ 792.959516] ext4_bread+0x7c/0x210 [ 792.963043] ? ext4_getblk+0x4f0/0x4f0 [ 792.967087] ? dquot_initialize_needed+0x290/0x290 [ 792.972005] ? trace_hardirqs_off+0x64/0x200 [ 792.976404] ext4_append+0x155/0x370 [ 792.980109] ext4_mkdir+0x5bd/0xe10 [ 792.983727] ? ext4_init_dot_dotdot+0x600/0x600 [ 792.988393] ? generic_permission+0x116/0x4d0 [ 792.992876] ? inode_permission.part.0+0x10c/0x450 [ 792.997795] vfs_mkdir+0x508/0x7a0 [ 793.001321] do_mkdirat+0x262/0x2d0 [ 793.004934] ? __ia32_sys_mknod+0x120/0x120 [ 793.009242] ? trace_hardirqs_off_caller+0x6e/0x210 [ 793.014246] ? do_syscall_64+0x21/0x620 [ 793.018209] do_syscall_64+0xf9/0x620 [ 793.021997] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 793.027178] RIP: 0033:0x7fe048271157 [ 793.030879] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 793.049762] RSP: 002b:00007fe046be6f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 793.057455] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fe048271157 [ 793.064707] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 793.071957] RBP: 00007fe046be7020 R08: 0000000000000000 R09: 00007fe046be71d0 [ 793.079211] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 793.086464] R13: 0000000020000100 R14: 00007fe046be6fe0 R15: 0000000020000140 07:26:08 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000004000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 793.123280] erofs: read_super, device -> /dev/loop4 [ 793.134913] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 793.147025] erofs: read_super, device -> /dev/loop1 [ 793.152056] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 793.156154] erofs: cannot find valid erofs superblock [ 793.214434] erofs: root inode @ nid 36 [ 793.218625] erofs: read_super, device -> /dev/loop2 [ 793.224918] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 793.249789] erofs: bogus i_mode (0) @ nid 36 07:26:09 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf", 0x8, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 793.264679] erofs: root inode @ nid 36 [ 793.280296] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:09 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000", 0x4, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:09 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 793.323340] erofs: read_super, device -> /dev/loop5 [ 793.338815] erofs: options -> noacl, [ 793.345814] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 793.365524] squashfs: SQUASHFS error: unable to read xattr id index table 07:26:09 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000001000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 793.367498] erofs: unmounted for /dev/loop2 [ 793.378512] erofs: root inode @ nid 0 [ 793.399858] erofs: bogus i_mode (0) @ nid 0 07:26:09 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:09 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 793.561187] erofs: read_super, device -> /dev/loop4 [ 793.579516] erofs: read_super, device -> /dev/loop1 [ 793.596218] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 793.604443] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 793.620784] erofs: root inode @ nid 36 [ 793.629268] erofs: blksize 1 isn't supported on this platform [ 793.654334] erofs: bogus i_mode (0) @ nid 36 [ 793.668334] squashfs: SQUASHFS error: unable to read fragment index table [ 793.698227] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 793.705429] squashfs: SQUASHFS error: unable to read xattr id index table [ 793.723853] erofs: read_super, device -> /dev/loop5 [ 793.729144] erofs: read_super, device -> /dev/loop2 [ 793.729192] erofs: options -> noacl, [ 793.738273] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, 07:26:09 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf", 0x8, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:09 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 793.746456] erofs: root inode @ nid 0 [ 793.751856] erofs: bogus i_mode (0) @ nid 0 [ 793.760408] erofs: cannot find valid erofs superblock 07:26:09 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:09 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040d5b43e01000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:09 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 793.892896] erofs: read_super, device -> /dev/loop4 [ 793.897977] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, 07:26:09 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 793.954628] erofs: read_super, device -> /dev/loop1 [ 794.007302] squashfs: SQUASHFS error: unable to read fragment index table [ 794.015918] erofs: read_super, device -> /dev/loop5 [ 794.021431] erofs: options -> noacl, [ 794.039353] erofs: root inode @ nid 0 [ 794.050688] erofs: bogus i_mode (0) @ nid 0 07:26:09 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 794.055710] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 794.063735] erofs: blksize 1 isn't supported on this platform [ 794.078588] erofs: root inode @ nid 36 [ 794.082782] erofs: bogus i_mode (300) @ nid 36 07:26:09 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000002000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:09 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:09 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf", 0x8, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:09 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 794.280607] erofs: read_super, device -> /dev/loop2 [ 794.304065] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 794.312279] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 794.322369] squashfs: SQUASHFS error: unable to read fragment index table [ 794.323059] erofs: cannot find valid erofs superblock [ 794.339413] squashfs: SQUASHFS error: unable to read xattr id index table [ 794.384152] erofs: read_super, device -> /dev/loop5 [ 794.389355] erofs: options -> noacl, [ 794.393622] erofs: root inode @ nid 0 [ 794.397745] erofs: bogus i_mode (0) @ nid 0 [ 794.414329] erofs: read_super, device -> /dev/loop1 [ 794.419462] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 794.427610] erofs: root inode @ nid 36 07:26:10 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 794.435387] erofs: bogus i_mode (300) @ nid 36 07:26:10 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:10 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 794.514981] erofs: read_super, device -> /dev/loop4 [ 794.520038] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 794.547769] erofs: blksize 1 isn't supported on this platform 07:26:10 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000003000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:10 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 794.559525] squashfs: SQUASHFS error: unable to read fragment index table [ 794.654073] erofs: read_super, device -> /dev/loop2 [ 794.659379] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 794.667993] erofs: cannot find valid erofs superblock 07:26:10 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:10 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 794.696784] erofs: read_super, device -> /dev/loop5 [ 794.701825] erofs: options -> noacl, [ 794.732761] erofs: root inode @ nid 0 [ 794.733549] SQUASHFS error: squashfs_read_data failed to read block 0x0 07:26:10 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf", 0x8, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 794.738435] erofs: bogus i_mode (0) @ nid 0 07:26:10 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 794.779621] squashfs: SQUASHFS error: unable to read xattr id index table 07:26:10 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000004000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 794.825500] erofs: read_super, device -> /dev/loop1 [ 794.837380] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 794.855991] squashfs: SQUASHFS error: unable to read fragment index table [ 794.865684] erofs: root inode @ nid 36 [ 794.881615] erofs: bogus i_mode (300) @ nid 36 [ 794.882043] erofs: read_super, device -> /dev/loop4 [ 794.891923] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 794.901105] erofs: blksize 1 isn't supported on this platform 07:26:10 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:10 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 794.943517] erofs: read_super, device -> /dev/loop2 [ 794.949034] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 794.959060] erofs: read_super, device -> /dev/loop5 [ 794.967844] erofs: options -> noacl, [ 794.976195] erofs: blksize 1 isn't supported on this platform [ 794.990130] erofs: root inode @ nid 0 [ 794.995077] erofs: bogus i_mode (0) @ nid 0 07:26:10 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:10 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:10 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf", 0x8, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 795.060896] squashfs: SQUASHFS error: unable to read fragment index table [ 795.094987] erofs: read_super, device -> /dev/loop1 07:26:10 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f00400000feffffff06000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) [ 795.113559] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 795.122227] erofs: root inode @ nid 36 [ 795.128271] erofs: bogus i_mode (0) @ nid 36 [ 795.143985] erofs: read_super, device -> /dev/loop4 [ 795.147291] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 795.149159] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 795.164554] erofs: blksize 1 isn't supported on this platform [ 795.186742] squashfs: SQUASHFS error: unable to read xattr id index table 07:26:10 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:11 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 795.224958] erofs: read_super, device -> /dev/loop5 [ 795.244880] erofs: options -> noacl, [ 795.250697] erofs: root inode @ nid 0 [ 795.256384] erofs: bogus i_mode (0) @ nid 0 [ 795.262508] squashfs: SQUASHFS error: unable to read fragment index table [ 795.279803] erofs: read_super, device -> /dev/loop2 [ 795.285757] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 795.300375] erofs: blksize 1 isn't supported on this platform [ 795.372469] erofs: read_super, device -> /dev/loop4 07:26:11 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf", 0x8, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:11 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:11 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000005000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:11 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 795.397800] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 795.427703] erofs: read_super, device -> /dev/loop1 [ 795.432744] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 795.441855] erofs: blksize 1 isn't supported on this platform 07:26:11 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 795.451269] erofs: root inode @ nid 36 [ 795.468045] erofs: bogus i_mode (0) @ nid 36 [ 795.553268] erofs: read_super, device -> /dev/loop2 [ 795.558969] erofs: read_super, device -> /dev/loop5 [ 795.571598] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 795.579927] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 795.590352] erofs: options -> noacl, [ 795.596323] SQUASHFS error: zlib decompression failed, data probably corrupt 07:26:11 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000000000000200000000000000000000009d84467c909b4069ad7bece966f677ad", 0x40, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 795.604357] SQUASHFS error: squashfs_read_data failed to read block 0x8f [ 795.611638] SQUASHFS error: Unable to read metadata cache entry [8f] [ 795.614596] erofs: read_super, device -> /dev/loop4 [ 795.622137] SQUASHFS error: Unable to read inode 0x11e [ 795.630559] squashfs: SQUASHFS error: unable to read xattr id index table [ 795.637918] erofs: root inode @ nid 0 [ 795.646411] erofs: blksize 1 isn't supported on this platform 07:26:11 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000000002000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) [ 795.653143] erofs: bogus i_mode (0) @ nid 0 [ 795.658733] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 795.666054] erofs: root inode @ nid 0 [ 795.670172] erofs: bogus i_mode (0) @ nid 0 07:26:11 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000006000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:11 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:11 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 795.796180] erofs: read_super, device -> /dev/loop1 [ 795.801502] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 795.828023] erofs: root inode @ nid 36 [ 795.832257] erofs: bogus i_mode (0) @ nid 36 07:26:11 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:11 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 795.911100] squashfs: SQUASHFS error: Filesystem uses "lzma" compression. This is not supported [ 795.935687] erofs: read_super, device -> /dev/loop2 [ 795.940725] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, 07:26:11 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 795.975513] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 795.987842] squashfs: SQUASHFS error: unable to read xattr id index table [ 795.996848] erofs: blksize 1 isn't supported on this platform [ 796.028512] erofs: read_super, device -> /dev/loop5 [ 796.034198] erofs: options -> noacl, [ 796.038932] erofs: root inode @ nid 0 [ 796.044612] erofs: bogus i_mode (0) @ nid 0 07:26:11 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:11 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000007000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 796.113052] erofs: read_super, device -> /dev/loop4 [ 796.129905] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 796.140480] erofs: root inode @ nid 0 [ 796.147859] erofs: bogus i_mode (0) @ nid 0 [ 796.158353] erofs: read_super, device -> /dev/loop1 [ 796.164263] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 796.171624] erofs: cannot find valid erofs superblock 07:26:11 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:11 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x60, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:12 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 796.255719] erofs: read_super, device -> /dev/loop2 07:26:12 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 796.282035] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 796.287920] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 796.293337] squashfs: SQUASHFS error: unable to read xattr id index table [ 796.328302] erofs: blksize 1 isn't supported on this platform 07:26:12 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:12 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000008000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 796.394777] erofs: read_super, device -> /dev/loop5 [ 796.402487] erofs: options -> noacl, [ 796.418820] erofs: root inode @ nid 0 [ 796.419818] erofs: read_super, device -> /dev/loop1 [ 796.433052] erofs: read_super, device -> /dev/loop4 [ 796.438081] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 796.439466] erofs: bogus i_mode (0) @ nid 0 [ 796.454167] SQUASHFS error: xz decompression failed, data probably corrupt [ 796.461199] SQUASHFS error: squashfs_read_data failed to read block 0x8f [ 796.466039] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 796.468212] SQUASHFS error: Unable to read metadata cache entry [8f] [ 796.481495] SQUASHFS error: Unable to read inode 0x11e [ 796.488661] erofs: root inode @ nid 0 07:26:12 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 796.492659] erofs: bogus i_mode (0) @ nid 0 [ 796.498451] erofs: cannot find valid erofs superblock 07:26:12 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:12 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:12 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 796.674310] erofs: read_super, device -> /dev/loop2 [ 796.684760] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 796.703510] squashfs: SQUASHFS error: unable to read xattr id index table [ 796.708560] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 796.741324] erofs: blksize 1 isn't supported on this platform [ 796.843739] erofs: read_super, device -> /dev/loop1 [ 796.849532] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 796.860256] erofs: read_super, device -> /dev/loop5 [ 796.872528] erofs: options -> noacl, [ 796.872776] erofs: read_super, device -> /dev/loop4 [ 796.879226] erofs: root inode @ nid 0 07:26:12 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:12 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:12 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000009000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:12 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x32a, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 796.891946] erofs: bogus i_mode (0) @ nid 0 [ 796.904520] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 796.911925] erofs: cannot find valid erofs superblock [ 796.921705] erofs: root inode @ nid 36 [ 796.929157] erofs: mounted on /dev/loop4 with opts: noacl. 07:26:12 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:12 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 796.985578] erofs: unmounted for /dev/loop4 [ 796.991223] squashfs: SQUASHFS error: unable to read fragment index table [ 797.002103] erofs: read_super, device -> /dev/loop2 [ 797.004052] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 797.009819] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 797.030984] squashfs: SQUASHFS error: unable to read xattr id index table [ 797.033658] erofs: root inode @ nid 0 [ 797.053225] erofs: bogus i_mode (0) @ nid 0 07:26:12 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:12 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 797.156623] erofs: read_super, device -> /dev/loop4 [ 797.158310] erofs: read_super, device -> /dev/loop1 [ 797.164676] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 797.167312] erofs: read_super, device -> /dev/loop5 [ 797.184529] erofs: options -> noacl, [ 797.190686] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 797.193971] erofs: root inode @ nid 0 [ 797.201841] erofs: root inode @ nid 0 07:26:12 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f00400000000a000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:13 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 797.210889] erofs: bogus i_mode (0) @ nid 0 [ 797.226832] erofs: bogus i_mode (0) @ nid 0 [ 797.243683] squashfs: SQUASHFS error: unable to read fragment index table [ 797.253791] erofs: cannot find valid erofs superblock 07:26:13 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:13 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 797.376443] erofs: read_super, device -> /dev/loop2 [ 797.381491] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 797.406246] erofs: root inode @ nid 0 [ 797.410513] erofs: bogus i_mode (0) @ nid 0 07:26:13 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 797.426046] erofs: read_super, device -> /dev/loop5 [ 797.431981] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 797.438186] erofs: options -> noacl, [ 797.445889] squashfs: SQUASHFS error: unable to read xattr id index table [ 797.456823] erofs: root inode @ nid 0 [ 797.468693] erofs: bogus i_mode (0) @ nid 0 07:26:13 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 797.520897] erofs: read_super, device -> /dev/loop4 [ 797.531865] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 797.542339] erofs: root inode @ nid 0 [ 797.551961] erofs: bogus i_mode (0) @ nid 0 07:26:13 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000010000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:13 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:13 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 797.664625] squashfs: SQUASHFS error: unable to read fragment index table [ 797.673008] erofs: read_super, device -> /dev/loop1 [ 797.686932] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 797.704998] erofs: cannot find valid erofs superblock 07:26:13 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f00400000001f000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 797.718714] erofs: read_super, device -> /dev/loop2 [ 797.724234] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 797.741444] erofs: root inode @ nid 0 [ 797.741848] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 797.746021] erofs: bogus i_mode (0) @ nid 0 [ 797.758586] squashfs: SQUASHFS error: unable to read xattr id index table 07:26:13 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:13 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:13 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 797.827599] erofs: read_super, device -> /dev/loop5 [ 797.840375] erofs: options -> noacl, [ 797.856236] erofs: root inode @ nid 0 [ 797.888715] erofs: bogus i_mode (0) @ nid 0 07:26:13 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 798.012469] squashfs: SQUASHFS error: unable to read fragment index table [ 798.031188] erofs: read_super, device -> /dev/loop4 [ 798.037476] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 798.043405] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 798.052006] squashfs: SQUASHFS error: unable to read xattr id index table 07:26:13 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 798.065684] erofs: root inode @ nid 0 [ 798.105860] erofs: bogus i_mode (0) @ nid 0 07:26:13 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:13 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000020000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 798.215251] erofs: read_super, device -> /dev/loop2 [ 798.220392] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 798.227694] erofs: read_super, device -> /dev/loop1 [ 798.227726] erofs: read_super, device -> /dev/loop5 [ 798.241975] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 798.247057] erofs: options -> noacl, [ 798.250125] squashfs: SQUASHFS error: unable to read fragment index table [ 798.255545] erofs: root inode @ nid 0 [ 798.273893] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 798.281224] erofs: bogus i_mode (0) @ nid 0 [ 798.287090] squashfs: SQUASHFS error: unable to read xattr id index table [ 798.288361] erofs: cannot find valid erofs superblock [ 798.300026] erofs: root inode @ nid 36 [ 798.308000] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:14 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000007000006000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:14 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000023000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:14 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:14 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 798.493353] erofs: read_super, device -> /dev/loop4 07:26:14 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 798.521667] erofs: unmounted for /dev/loop2 [ 798.525681] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 798.534352] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 798.538653] squashfs: SQUASHFS error: unable to read fragment index table [ 798.559293] squashfs: SQUASHFS error: unable to read xattr id index table [ 798.566764] erofs: cannot find valid erofs superblock 07:26:14 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:14 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f00400000003f000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:14 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 798.686947] erofs: read_super, device -> /dev/loop1 [ 798.692254] erofs: read_super, device -> /dev/loop5 [ 798.693134] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 798.704564] erofs: read_super, device -> /dev/loop2 [ 798.711848] erofs: options -> noacl, [ 798.726350] erofs: root inode @ nid 0 [ 798.729599] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 798.749948] erofs: bogus i_mode (0) @ nid 0 [ 798.754206] erofs: root inode @ nid 0 [ 798.758798] erofs: cannot find valid erofs superblock [ 798.774569] erofs: bogus i_mode (0) @ nid 0 07:26:14 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2a03, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 798.797215] squashfs: SQUASHFS error: unable to read fragment index table 07:26:14 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000010000006000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:14 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 798.913666] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 798.938314] squashfs: SQUASHFS error: unable to read xattr id index table [ 798.957013] erofs: read_super, device -> /dev/loop4 07:26:14 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:14 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000048000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 798.969316] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 798.986911] erofs: cannot find valid erofs superblock 07:26:14 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 799.045880] erofs: read_super, device -> /dev/loop1 [ 799.050919] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 799.069242] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 799.076348] squashfs: SQUASHFS error: unable to read xattr id index table [ 799.080032] erofs: cannot find valid erofs superblock [ 799.099900] erofs: read_super, device -> /dev/loop2 [ 799.106325] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 799.106431] squashfs: SQUASHFS error: unable to read fragment index table [ 799.115086] erofs: root inode @ nid 0 [ 799.125160] erofs: bogus i_mode (0) @ nid 0 [ 799.148135] erofs: read_super, device -> /dev/loop5 [ 799.153222] erofs: options -> noacl, [ 799.157168] erofs: root inode @ nid 0 [ 799.161110] erofs: bogus i_mode (0) @ nid 0 07:26:15 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:15 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:15 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 799.257815] erofs: read_super, device -> /dev/loop4 [ 799.269320] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 799.287104] erofs: cannot find valid erofs superblock 07:26:15 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f00400000004c000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:15 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f00, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:15 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 799.385773] erofs: read_super, device -> /dev/loop1 [ 799.399658] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 799.423551] erofs: read_super, device -> /dev/loop2 [ 799.424598] squashfs: SQUASHFS error: unable to read fragment index table 07:26:15 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024000000000000000000e803000000000000", 0x20, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 799.435586] erofs: cannot find valid erofs superblock [ 799.440885] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 799.448234] erofs: root inode @ nid 0 [ 799.452374] erofs: bogus i_mode (0) @ nid 0 07:26:15 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:15 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 799.556207] erofs: read_super, device -> /dev/loop5 [ 799.561261] erofs: options -> noacl, [ 799.568325] erofs: read_super, device -> /dev/loop4 [ 799.589237] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 799.601683] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 799.616513] erofs: root inode @ nid 0 [ 799.622000] erofs: root inode @ nid 36 [ 799.624073] squashfs: SQUASHFS error: unable to read xattr id index table [ 799.637580] erofs: mounted on /dev/loop4 with opts: noacl. [ 799.642081] erofs: bogus i_mode (0) @ nid 0 07:26:15 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) [ 799.659490] erofs: read_super, device -> /dev/loop2 [ 799.668740] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 799.679638] erofs: unmounted for /dev/loop4 [ 799.686535] erofs: cannot find valid erofs superblock [ 799.793438] erofs: read_super, device -> /dev/loop1 [ 799.798550] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 799.814422] erofs: root inode @ nid 36 [ 799.818615] erofs: mounted on /dev/loop1 with opts: noacl. 07:26:15 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000060000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:15 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:15 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:15 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 799.856625] squashfs: SQUASHFS error: unable to read fragment index table 07:26:15 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 799.897328] erofs: unmounted for /dev/loop1 07:26:15 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) [ 799.999279] erofs: read_super, device -> /dev/loop2 [ 800.007643] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 800.024303] erofs: cannot find valid erofs superblock [ 800.034061] erofs: read_super, device -> /dev/loop5 [ 800.039373] erofs: read_super, device -> /dev/loop1 07:26:15 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 800.053152] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 800.061436] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 800.068847] erofs: options -> noacl, [ 800.077147] squashfs: SQUASHFS error: unable to read xattr id index table [ 800.083272] erofs: cannot find valid erofs superblock [ 800.087786] erofs: root inode @ nid 0 [ 800.093945] erofs: bogus i_mode (0) @ nid 0 07:26:15 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:15 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) [ 800.181835] squashfs: SQUASHFS error: unable to read fragment index table 07:26:15 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000068000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:16 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xedc0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:16 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000068000006000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) [ 800.329327] erofs: read_super, device -> /dev/loop2 [ 800.334581] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 800.370606] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 800.383236] erofs: cannot find valid erofs superblock [ 800.396044] erofs: read_super, device -> /dev/loop5 [ 800.402290] squashfs: SQUASHFS error: unable to read xattr id index table [ 800.414890] erofs: options -> noacl, [ 800.422211] erofs: root inode @ nid 0 [ 800.428056] erofs: bogus i_mode (0) @ nid 0 07:26:16 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f00400000006c000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:16 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:16 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:16 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}]}) [ 800.538832] squashfs: SQUASHFS error: unable to read fragment index table [ 800.563181] erofs: read_super, device -> /dev/loop1 [ 800.574988] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 800.587532] erofs: cannot find valid erofs superblock 07:26:16 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f00400000006c000006000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) [ 800.777624] erofs: read_super, device -> /dev/loop5 [ 800.792723] erofs: read_super, device -> /dev/loop2 [ 800.797756] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 800.802116] erofs: options -> noacl, [ 800.818533] SQUASHFS error: squashfs_read_data failed to read block 0x0 07:26:16 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 800.830110] erofs: root inode @ nid 0 [ 800.845654] squashfs: SQUASHFS error: unable to read xattr id index table [ 800.853387] erofs: bogus i_mode (0) @ nid 0 [ 800.865516] erofs: read_super, device -> /dev/loop4 [ 800.868850] erofs: root inode @ nid 36 [ 800.900740] erofs: options -> noacl,noacl,nouser_xattr,noacl, [ 800.914940] erofs: mounted on /dev/loop2 with opts: noacl. [ 800.926791] erofs: root inode @ nid 36 07:26:16 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, 0x0) 07:26:16 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1fffff, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:16 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 800.948400] squashfs: SQUASHFS error: unable to read fragment index table [ 800.957096] erofs: unmounted for /dev/loop2 [ 800.957353] erofs: mounted on /dev/loop4 with opts: noacl. 07:26:16 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000074000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:16 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}]}) [ 801.083283] erofs: unmounted for /dev/loop4 [ 801.095497] erofs: read_super, device -> /dev/loop1 [ 801.100999] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 801.102707] erofs: read_super, device -> /dev/loop5 [ 801.129468] erofs: cannot find valid erofs superblock [ 801.143005] erofs: options -> noacl, [ 801.149904] erofs: root inode @ nid 0 07:26:16 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c002400", 0x10, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 801.176202] erofs: bogus i_mode (0) @ nid 0 07:26:16 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:17 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 801.230534] squashfs: SQUASHFS error: unable to read fragment index table 07:26:17 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, 0x0) [ 801.286550] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 801.297688] squashfs: SQUASHFS error: unable to read xattr id index table [ 801.376868] erofs: read_super, device -> /dev/loop4 [ 801.382787] erofs: read_super, device -> /dev/loop1 [ 801.393107] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 801.393424] erofs: options -> noacl,noacl,nouser_xattr,noacl, [ 801.406722] erofs: root inode @ nid 36 [ 801.413364] erofs: mounted on /dev/loop1 with opts: noacl. 07:26:17 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f00400000007a000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:17 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 801.431780] erofs: root inode @ nid 36 [ 801.442638] erofs: read_super, device -> /dev/loop5 [ 801.447666] erofs: options -> noacl, [ 801.462717] erofs: unmounted for /dev/loop1 [ 801.469337] erofs: root inode @ nid 0 [ 801.481174] erofs: mounted on /dev/loop4 with opts: noacl. [ 801.507869] erofs: bogus i_mode (0) @ nid 0 07:26:17 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}]}) 07:26:17 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 801.574180] erofs: unmounted for /dev/loop4 [ 801.575582] squashfs: SQUASHFS error: unable to read fragment index table 07:26:17 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:17 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, 0x0) [ 801.684215] erofs: read_super, device -> /dev/loop1 [ 801.684777] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 801.694032] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 801.701755] squashfs: SQUASHFS error: unable to read xattr id index table [ 801.703916] erofs: cannot find valid erofs superblock [ 801.863680] erofs: read_super, device -> /dev/loop5 [ 801.868719] erofs: options -> noacl, [ 801.883876] squashfs: SQUASHFS error: unable to read fragment index table 07:26:17 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:17 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000382000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 801.919012] erofs: root inode @ nid 0 [ 801.929635] erofs: read_super, device -> /dev/loop4 [ 801.938103] erofs: options -> noacl,noacl,nouser_xattr,noacl, [ 801.952964] erofs: bogus i_mode (0) @ nid 0 07:26:17 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:17 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}]}) [ 801.967143] erofs: root inode @ nid 36 [ 801.978825] erofs: mounted on /dev/loop4 with opts: noacl. 07:26:17 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {}]}) [ 802.045732] erofs: unmounted for /dev/loop4 07:26:17 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 802.080976] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 802.096344] squashfs: SQUASHFS error: unable to read xattr id index table [ 802.108975] erofs: read_super, device -> /dev/loop1 [ 802.116904] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 802.126014] squashfs: SQUASHFS error: unable to read fragment index table [ 802.127407] erofs: cannot find valid erofs superblock 07:26:17 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f00400000268a000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:17 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:18 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 802.257921] erofs: read_super, device -> /dev/loop2 [ 802.263168] erofs: options -> noacl,noacl,nouser_xattr,noacl, [ 802.269416] erofs: root inode @ nid 36 [ 802.280083] erofs: read_super, device -> /dev/loop4 [ 802.281335] erofs: mounted on /dev/loop2 with opts: noacl. [ 802.287491] erofs: options -> noacl,noacl,nouser_xattr,user_xattr, 07:26:18 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}]}) [ 802.309388] erofs: read_super, device -> /dev/loop5 [ 802.316546] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 802.325795] erofs: options -> noacl, [ 802.331227] erofs: unmounted for /dev/loop2 [ 802.334532] squashfs: SQUASHFS error: unable to read xattr id index table [ 802.345039] erofs: root inode @ nid 0 [ 802.349151] erofs: root inode @ nid 36 [ 802.359117] erofs: mounted on /dev/loop4 with opts: noacl. [ 802.359983] squashfs: SQUASHFS error: unable to read fragment index table [ 802.375199] erofs: bogus i_mode (0) @ nid 0 07:26:18 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {@noacl}, {}]}) [ 802.425884] erofs: unmounted for /dev/loop4 [ 802.456521] erofs: read_super, device -> /dev/loop2 [ 802.461556] erofs: options -> noacl,noacl,nouser_xattr,noacl, [ 802.472853] erofs: root inode @ nid 36 [ 802.476936] erofs: mounted on /dev/loop2 with opts: noacl. [ 802.493880] erofs: read_super, device -> /dev/loop1 [ 802.498910] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 802.510235] erofs: cannot find valid erofs superblock 07:26:18 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}]}) 07:26:18 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:18 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000050006000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:18 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040ffffff8c000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 802.559485] erofs: unmounted for /dev/loop2 07:26:18 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf", 0x8, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 802.679506] erofs: read_super, device -> /dev/loop4 [ 802.706392] erofs: options -> noacl,noacl,user_xattr, [ 802.711200] erofs: read_super, device -> /dev/loop1 [ 802.715930] erofs: root inode @ nid 36 [ 802.720525] squashfs: SQUASHFS error: unable to read fragment index table [ 802.728329] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 802.734275] erofs: mounted on /dev/loop4 with opts: noacl. [ 802.743581] erofs: blksize 1 isn't supported on this platform [ 802.823297] erofs: read_super, device -> /dev/loop2 [ 802.828340] erofs: options -> noacl,noacl,nouser_xattr,noacl, [ 802.835360] erofs: root inode @ nid 36 [ 802.839495] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:18 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f00400000038f000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:18 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:18 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {}]}) [ 802.863829] erofs: read_super, device -> /dev/loop5 07:26:18 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf", 0x8, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:18 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 802.902867] erofs: unmounted for /dev/loop2 [ 802.907294] erofs: options -> noacl, [ 802.918868] erofs: unmounted for /dev/loop4 [ 802.928057] erofs: root inode @ nid 0 [ 802.944333] erofs: bogus i_mode (0) @ nid 0 07:26:18 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 803.020231] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 803.046190] erofs: read_super, device -> /dev/loop1 [ 803.053985] squashfs: SQUASHFS error: unable to read fragment index table [ 803.058515] erofs: read_super, device -> /dev/loop4 [ 803.076313] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 803.078600] erofs: options -> noacl,user_xattr, [ 803.100474] squashfs: SQUASHFS error: unable to read xattr id index table 07:26:18 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 803.124503] erofs: blksize 1 isn't supported on this platform [ 803.139665] erofs: root inode @ nid 36 [ 803.144610] erofs: mounted on /dev/loop4 with opts: noacl. 07:26:18 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf", 0x8, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:19 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 803.251788] erofs: unmounted for /dev/loop4 [ 803.300932] erofs: read_super, device -> /dev/loop5 07:26:19 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000390000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 803.321940] erofs: options -> noacl, [ 803.335500] erofs: read_super, device -> /dev/loop2 [ 803.346219] erofs: root inode @ nid 0 [ 803.348243] erofs: options -> noacl,noacl,nouser_xattr,user_xattr, [ 803.355140] erofs: bogus i_mode (0) @ nid 0 [ 803.367640] squashfs: SQUASHFS error: unable to read fragment index table [ 803.393318] erofs: root inode @ nid 36 [ 803.398890] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:19 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:19 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:19 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {@noacl}, {}]}) [ 803.442722] erofs: read_super, device -> /dev/loop1 [ 803.447862] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 803.458478] erofs: blksize 1 isn't supported on this platform [ 803.465206] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 803.471988] squashfs: SQUASHFS error: unable to read xattr id index table [ 803.501116] erofs: unmounted for /dev/loop2 [ 803.523125] erofs: read_super, device -> /dev/loop4 [ 803.528357] erofs: options -> noacl,user_xattr, [ 803.534250] erofs: root inode @ nid 36 [ 803.538431] erofs: mounted on /dev/loop4 with opts: noacl. 07:26:19 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{}]}) 07:26:19 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000391000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:19 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 803.612022] squashfs: SQUASHFS error: unable to read fragment index table [ 803.642756] erofs: unmounted for /dev/loop4 07:26:19 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:19 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 803.762019] erofs: read_super, device -> /dev/loop2 [ 803.767274] erofs: options -> noacl,noacl,user_xattr, [ 803.770061] erofs: read_super, device -> /dev/loop5 [ 803.775071] erofs: root inode @ nid 36 [ 803.781641] erofs: mounted on /dev/loop2 with opts: noacl. [ 803.789704] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 803.812214] erofs: unmounted for /dev/loop2 [ 803.819869] erofs: options -> noacl, [ 803.827320] erofs: root inode @ nid 0 [ 803.831380] erofs: read_super, device -> /dev/loop1 [ 803.838018] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 803.854363] erofs: bogus i_mode (0) @ nid 0 [ 803.858663] squashfs: SQUASHFS error: unable to read xattr id index table [ 803.858824] erofs: blksize 1 isn't supported on this platform [ 803.887129] erofs: read_super, device -> /dev/loop4 [ 803.888875] squashfs: SQUASHFS error: unable to read fragment index table [ 803.892160] erofs: options -> user_xattr, 07:26:19 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 803.914686] erofs: root inode @ nid 36 [ 803.927866] erofs: mounted on /dev/loop4 with opts: user_xattr. 07:26:19 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:19 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000392000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:19 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 804.071336] erofs: read_super, device -> /dev/loop2 07:26:19 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{}]}) [ 804.137704] erofs: unmounted for /dev/loop4 [ 804.146840] erofs: options -> noacl,user_xattr, [ 804.163624] erofs: read_super, device -> /dev/loop5 [ 804.179858] erofs: options -> noacl, [ 804.183917] erofs: root inode @ nid 36 07:26:19 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{}]}) [ 804.187962] erofs: root inode @ nid 0 [ 804.191953] erofs: mounted on /dev/loop2 with opts: noacl. [ 804.200064] erofs: bogus i_mode (0) @ nid 0 [ 804.207974] squashfs: SQUASHFS error: unable to read fragment index table [ 804.230370] erofs: unmounted for /dev/loop2 07:26:20 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:20 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 804.342639] erofs: read_super, device -> /dev/loop4 [ 804.348858] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 804.353764] erofs: read_super, device -> /dev/loop1 [ 804.364753] squashfs: SQUASHFS error: unable to read xattr id index table [ 804.370300] erofs: options -> user_xattr, 07:26:20 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000393000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:20 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{}]}) [ 804.389769] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 804.400378] erofs: root inode @ nid 36 [ 804.404758] erofs: mounted on /dev/loop4 with opts: user_xattr. [ 804.411662] erofs: blksize 1 isn't supported on this platform [ 804.452585] erofs: unmounted for /dev/loop4 [ 804.463543] erofs: read_super, device -> /dev/loop2 [ 804.469826] squashfs: SQUASHFS error: unable to read fragment index table [ 804.475877] erofs: options -> user_xattr, [ 804.484739] erofs: root inode @ nid 36 [ 804.489165] erofs: mounted on /dev/loop2 with opts: user_xattr. [ 804.489199] erofs: read_super, device -> /dev/loop5 07:26:20 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:20 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000600006000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) [ 804.503048] erofs: options -> noacl, [ 804.508066] erofs: root inode @ nid 0 [ 804.528106] erofs: bogus i_mode (0) @ nid 0 07:26:20 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{}]}) 07:26:20 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 804.588246] erofs: unmounted for /dev/loop2 [ 804.657252] erofs: read_super, device -> /dev/loop4 [ 804.664818] erofs: options -> user_xattr, [ 804.673623] erofs: root inode @ nid 36 [ 804.678802] erofs: mounted on /dev/loop4 with opts: user_xattr. [ 804.691666] erofs: read_super, device -> /dev/loop1 [ 804.700118] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 804.716910] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 804.731072] squashfs: SQUASHFS error: unable to read xattr id index table [ 804.752870] erofs: blksize 1 isn't supported on this platform 07:26:20 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000394000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:20 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 804.775134] squashfs: SQUASHFS error: unable to read fragment index table 07:26:20 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 804.837133] erofs: read_super, device -> /dev/loop5 [ 804.842892] erofs: options -> noacl, [ 804.855303] erofs: unmounted for /dev/loop4 [ 804.875835] erofs: read_super, device -> /dev/loop2 [ 804.880872] erofs: options -> user_xattr, [ 804.891001] erofs: root inode @ nid 0 [ 804.895392] erofs: bogus i_mode (0) @ nid 0 [ 804.924652] erofs: root inode @ nid 36 07:26:20 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 804.940936] erofs: mounted on /dev/loop2 with opts: user_xattr. [ 804.973667] erofs: read_super, device -> /dev/loop1 07:26:20 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2a030000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:20 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{}]}) [ 804.986165] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 804.993811] erofs: root inode @ nid 0 [ 805.030266] erofs: unmounted for /dev/loop2 [ 805.033605] erofs: bogus i_mode (0) @ nid 0 [ 805.065399] squashfs: SQUASHFS error: unable to read fragment index table [ 805.102923] SQUASHFS error: squashfs_read_data failed to read block 0x0 07:26:20 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:20 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 805.109748] squashfs: SQUASHFS error: unable to read xattr id index table [ 805.179958] SQUASHFS error: xz decompression failed, data probably corrupt [ 805.187546] SQUASHFS error: squashfs_read_data failed to read block 0x8f [ 805.194703] SQUASHFS error: Unable to read metadata cache entry [8f] [ 805.201204] SQUASHFS error: Unable to read inode 0x11e [ 805.242529] erofs: read_super, device -> /dev/loop5 [ 805.252062] erofs: options -> noacl, [ 805.259434] erofs: root inode @ nid 0 [ 805.270610] erofs: bogus i_mode (0) @ nid 0 07:26:21 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:21 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000395000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 805.288239] squashfs: SQUASHFS error: unable to read fragment index table 07:26:21 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 805.364755] erofs: read_super, device -> /dev/loop2 07:26:21 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 805.394862] erofs: options -> user_xattr, [ 805.405238] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 805.412114] squashfs: SQUASHFS error: unable to read xattr id index table [ 805.422349] erofs: read_super, device -> /dev/loop1 [ 805.428057] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 805.446350] erofs: root inode @ nid 36 [ 805.450660] erofs: mounted on /dev/loop2 with opts: user_xattr. [ 805.460552] erofs: root inode @ nid 0 [ 805.465098] erofs: bogus i_mode (0) @ nid 0 07:26:21 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 1) 07:26:21 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000396000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:21 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 805.492440] erofs: unmounted for /dev/loop2 [ 805.511776] SQUASHFS error: xz decompression failed, data probably corrupt [ 805.565385] SQUASHFS error: squashfs_read_data failed to read block 0x8f [ 805.595203] squashfs: SQUASHFS error: unable to read fragment index table 07:26:21 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040000000007a0006000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) [ 805.636687] SQUASHFS error: Unable to read metadata cache entry [8f] [ 805.673680] erofs: read_super, device -> /dev/loop5 [ 805.695942] FAULT_INJECTION: forcing a failure. [ 805.695942] name failslab, interval 1, probability 0, space 0, times 0 [ 805.704190] erofs: options -> noacl, [ 805.708728] SQUASHFS error: Unable to read inode 0x11e [ 805.725186] erofs: root inode @ nid 0 [ 805.747884] erofs: read_super, device -> /dev/loop1 [ 805.752399] erofs: bogus i_mode (0) @ nid 0 [ 805.761581] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 805.769969] CPU: 0 PID: 29028 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 805.777860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 805.787211] Call Trace: [ 805.789807] dump_stack+0x1fc/0x2ef [ 805.793447] should_fail.cold+0xa/0xf [ 805.797254] ? setup_fault_attr+0x200/0x200 [ 805.797798] erofs: root inode @ nid 0 [ 805.801582] ? lock_acquire+0x170/0x3c0 [ 805.801606] __should_failslab+0x115/0x180 [ 805.801625] should_failslab+0x5/0x10 [ 805.801637] __kmalloc+0x2ab/0x3c0 [ 805.801652] ? __se_sys_memfd_create+0xf8/0x440 [ 805.808332] erofs: bogus i_mode (0) @ nid 0 [ 805.809399] __se_sys_memfd_create+0xf8/0x440 [ 805.809416] ? memfd_file_seals_ptr+0x150/0x150 [ 805.809434] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 805.809450] ? trace_hardirqs_off_caller+0x6e/0x210 [ 805.809466] ? do_syscall_64+0x21/0x620 [ 805.853369] do_syscall_64+0xf9/0x620 [ 805.857167] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 805.862347] RIP: 0033:0x7ff4b2beb049 [ 805.866052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 805.885036] RSP: 002b:00007ff4b155ff28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 805.892746] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007ff4b2beb049 [ 805.900006] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007ff4b2c441e0 [ 805.907284] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007ff4b15601d0 [ 805.914547] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 805.921809] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 [ 805.934213] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 805.941005] squashfs: SQUASHFS error: unable to read xattr id index table 07:26:21 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:21 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 2) 07:26:21 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x60000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 805.999452] squashfs: SQUASHFS error: unable to read fragment index table 07:26:21 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 806.078224] FAULT_INJECTION: forcing a failure. [ 806.078224] name failslab, interval 1, probability 0, space 0, times 0 [ 806.090104] CPU: 0 PID: 29050 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 806.097991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 806.107334] Call Trace: [ 806.109911] dump_stack+0x1fc/0x2ef [ 806.113530] should_fail.cold+0xa/0xf [ 806.117324] ? setup_fault_attr+0x200/0x200 [ 806.121636] ? lock_acquire+0x170/0x3c0 [ 806.125604] __should_failslab+0x115/0x180 [ 806.129832] should_failslab+0x5/0x10 [ 806.133619] kmem_cache_alloc+0x277/0x370 [ 806.137754] ? shmem_destroy_callback+0xb0/0xb0 [ 806.142419] shmem_alloc_inode+0x18/0x40 [ 806.146471] ? shmem_destroy_callback+0xb0/0xb0 [ 806.151134] alloc_inode+0x5d/0x180 [ 806.154749] new_inode+0x1d/0xf0 [ 806.158104] shmem_get_inode+0x96/0x8d0 [ 806.162074] __shmem_file_setup.part.0+0x7a/0x2b0 [ 806.166912] shmem_file_setup+0x61/0x90 [ 806.170873] __se_sys_memfd_create+0x26b/0x440 [ 806.175444] ? memfd_file_seals_ptr+0x150/0x150 [ 806.180107] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 806.185462] ? trace_hardirqs_off_caller+0x6e/0x210 [ 806.190477] ? do_syscall_64+0x21/0x620 [ 806.194444] do_syscall_64+0xf9/0x620 [ 806.198245] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 806.203418] RIP: 0033:0x7ff4b2beb049 [ 806.207120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:26:22 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 3) [ 806.226006] RSP: 002b:00007ff4b155ff28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 806.233705] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007ff4b2beb049 [ 806.240957] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007ff4b2c441e0 [ 806.248212] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007ff4b15601d0 [ 806.255467] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 806.262719] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 07:26:22 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000397000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:22 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 806.366395] erofs: read_super, device -> /dev/loop1 [ 806.371446] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 806.396439] erofs: read_super, device -> /dev/loop5 [ 806.417225] FAULT_INJECTION: forcing a failure. [ 806.417225] name failslab, interval 1, probability 0, space 0, times 0 [ 806.429435] erofs: options -> noacl, [ 806.436396] CPU: 1 PID: 29060 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 806.444386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 806.447030] erofs: root inode @ nid 0 [ 806.453734] Call Trace: [ 806.453757] dump_stack+0x1fc/0x2ef [ 806.453777] should_fail.cold+0xa/0xf [ 806.453795] ? setup_fault_attr+0x200/0x200 [ 806.453809] ? lock_acquire+0x170/0x3c0 [ 806.453829] __should_failslab+0x115/0x180 [ 806.453845] should_failslab+0x5/0x10 [ 806.453861] kmem_cache_alloc+0x277/0x370 [ 806.461724] erofs: root inode @ nid 36 [ 806.463826] __d_alloc+0x2b/0xa10 [ 806.463847] d_alloc_pseudo+0x19/0x70 [ 806.463865] alloc_file_pseudo+0xc6/0x250 [ 806.463882] ? alloc_file+0x4d0/0x4d0 [ 806.463895] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 806.463913] ? shmem_get_inode+0x44c/0x8d0 07:26:22 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 806.473437] erofs: mounted on /dev/loop1 with opts: noacl. [ 806.476067] __shmem_file_setup.part.0+0x102/0x2b0 [ 806.476089] shmem_file_setup+0x61/0x90 [ 806.476103] __se_sys_memfd_create+0x26b/0x440 [ 806.476118] ? memfd_file_seals_ptr+0x150/0x150 [ 806.498416] erofs: bogus i_mode (0) @ nid 0 [ 806.499359] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 806.550454] ? trace_hardirqs_off_caller+0x6e/0x210 [ 806.555478] ? do_syscall_64+0x21/0x620 [ 806.559463] do_syscall_64+0xf9/0x620 [ 806.563271] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 806.568457] RIP: 0033:0x7ff4b2beb049 [ 806.572154] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 806.591153] RSP: 002b:00007ff4b155ff28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 806.598848] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007ff4b2beb049 [ 806.606099] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007ff4b2c441e0 07:26:22 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 4) [ 806.613360] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007ff4b15601d0 [ 806.620609] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 806.627859] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 [ 806.635540] erofs: unmounted for /dev/loop1 [ 806.681123] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 806.689445] SQUASHFS error: xz decompression failed, data probably corrupt [ 806.709259] FAULT_INJECTION: forcing a failure. [ 806.709259] name failslab, interval 1, probability 0, space 0, times 0 [ 806.709424] squashfs: SQUASHFS error: unable to read xattr id index table [ 806.723531] CPU: 0 PID: 29078 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 806.728565] SQUASHFS error: squashfs_read_data failed to read block 0x8f [ 806.735541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 806.735547] Call Trace: [ 806.735573] dump_stack+0x1fc/0x2ef [ 806.735591] should_fail.cold+0xa/0xf [ 806.735608] ? setup_fault_attr+0x200/0x200 [ 806.735622] ? lock_acquire+0x170/0x3c0 [ 806.735640] __should_failslab+0x115/0x180 [ 806.735657] should_failslab+0x5/0x10 [ 806.735671] kmem_cache_alloc+0x277/0x370 [ 806.735692] __alloc_file+0x21/0x340 [ 806.742706] SQUASHFS error: Unable to read metadata cache entry [8f] [ 806.751853] alloc_empty_file+0x6d/0x170 [ 806.751870] alloc_file+0x5e/0x4d0 [ 806.751891] alloc_file_pseudo+0x165/0x250 [ 806.755052] SQUASHFS error: Unable to read inode 0x11e [ 806.758064] ? alloc_file+0x4d0/0x4d0 [ 806.758080] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 806.758097] ? shmem_get_inode+0x44c/0x8d0 [ 806.758116] __shmem_file_setup.part.0+0x102/0x2b0 [ 806.785383] squashfs: SQUASHFS error: unable to read fragment index table [ 806.785977] shmem_file_setup+0x61/0x90 [ 806.838867] __se_sys_memfd_create+0x26b/0x440 [ 806.843433] ? memfd_file_seals_ptr+0x150/0x150 [ 806.848085] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 806.853431] ? trace_hardirqs_off_caller+0x6e/0x210 [ 806.858441] ? do_syscall_64+0x21/0x620 [ 806.862404] do_syscall_64+0xf9/0x620 [ 806.866204] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 806.871400] RIP: 0033:0x7ff4b2beb049 [ 806.875102] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 806.893986] RSP: 002b:00007ff4b155ff28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 806.901675] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007ff4b2beb049 [ 806.908928] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007ff4b2c441e0 [ 806.916177] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007ff4b15601d0 [ 806.923427] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 07:26:22 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:22 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 5) [ 806.930676] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 07:26:22 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040ffffff97000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:22 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:22 executing program 4: syz_mount_image$squashfs(0x0, &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 807.086429] erofs: read_super, device -> /dev/loop1 [ 807.100075] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 807.125735] erofs: root inode @ nid 0 [ 807.129064] FAULT_INJECTION: forcing a failure. [ 807.129064] name failslab, interval 1, probability 0, space 0, times 0 [ 807.130342] erofs: bogus i_mode (0) @ nid 0 [ 807.142868] CPU: 1 PID: 29096 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 807.153276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 807.162621] Call Trace: [ 807.165204] dump_stack+0x1fc/0x2ef [ 807.168820] should_fail.cold+0xa/0xf [ 807.172613] ? setup_fault_attr+0x200/0x200 [ 807.176921] ? lock_acquire+0x170/0x3c0 [ 807.180893] __should_failslab+0x115/0x180 [ 807.185117] should_failslab+0x5/0x10 [ 807.188906] kmem_cache_alloc_trace+0x284/0x380 [ 807.193565] apparmor_file_alloc_security+0x394/0xad0 [ 807.198743] ? apparmor_file_receive+0x160/0x160 [ 807.203487] ? __alloc_file+0x21/0x340 [ 807.207366] security_file_alloc+0x40/0x90 [ 807.211586] __alloc_file+0xd8/0x340 [ 807.215288] alloc_empty_file+0x6d/0x170 [ 807.219335] alloc_file+0x5e/0x4d0 [ 807.222863] alloc_file_pseudo+0x165/0x250 [ 807.227088] ? alloc_file+0x4d0/0x4d0 [ 807.230875] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 807.236484] ? shmem_get_inode+0x44c/0x8d0 [ 807.240714] __shmem_file_setup.part.0+0x102/0x2b0 [ 807.245630] shmem_file_setup+0x61/0x90 [ 807.249591] __se_sys_memfd_create+0x26b/0x440 [ 807.254158] ? memfd_file_seals_ptr+0x150/0x150 [ 807.258812] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 807.264162] ? trace_hardirqs_off_caller+0x6e/0x210 [ 807.269162] ? do_syscall_64+0x21/0x620 [ 807.273130] do_syscall_64+0xf9/0x620 [ 807.276929] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 807.282111] RIP: 0033:0x7ff4b2beb049 [ 807.285821] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 807.304712] RSP: 002b:00007ff4b155ff28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 807.312410] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007ff4b2beb049 [ 807.319668] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007ff4b2c441e0 [ 807.326921] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007ff4b15601d0 [ 807.334174] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 807.341429] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 07:26:23 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 6) 07:26:23 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000398000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 807.382939] erofs: read_super, device -> /dev/loop5 [ 807.401663] erofs: options -> noacl, [ 807.409931] erofs: root inode @ nid 0 [ 807.446275] erofs: bogus i_mode (0) @ nid 0 [ 807.461490] squashfs: SQUASHFS error: unable to read fragment index table [ 807.485458] FAULT_INJECTION: forcing a failure. [ 807.485458] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 807.497981] CPU: 1 PID: 29109 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 807.505875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 807.515217] Call Trace: [ 807.517800] dump_stack+0x1fc/0x2ef [ 807.521417] should_fail.cold+0xa/0xf [ 807.525204] ? lock_acquire+0x170/0x3c0 [ 807.529164] ? setup_fault_attr+0x200/0x200 [ 807.533478] __alloc_pages_nodemask+0x239/0x2890 [ 807.538224] ? __lock_acquire+0x6de/0x3ff0 [ 807.542446] ? static_obj+0x50/0x50 [ 807.546065] ? __lock_acquire+0x6de/0x3ff0 [ 807.550286] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 807.555115] ? __lock_acquire+0x6de/0x3ff0 [ 807.559344] ? mark_held_locks+0xf0/0xf0 [ 807.563401] ? unwind_next_frame+0xeee/0x1400 [ 807.567883] ? mark_held_locks+0xf0/0xf0 [ 807.571926] ? deref_stack_reg+0x134/0x1d0 [ 807.576149] ? get_reg+0x176/0x1f0 [ 807.579677] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 807.585548] alloc_pages_vma+0xf2/0x780 [ 807.589514] shmem_alloc_page+0x11c/0x1f0 [ 807.593649] ? shmem_swapin+0x220/0x220 [ 807.597625] ? percpu_counter_add_batch+0x126/0x180 [ 807.602627] ? __vm_enough_memory+0x316/0x650 [ 807.607111] shmem_alloc_and_acct_page+0x15a/0x850 [ 807.612031] shmem_getpage_gfp+0x4e9/0x37f0 [ 807.616349] ? shmem_alloc_and_acct_page+0x850/0x850 [ 807.621441] ? mark_held_locks+0xa6/0xf0 [ 807.625491] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 807.630667] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 807.635845] shmem_write_begin+0xff/0x1e0 [ 807.639985] generic_perform_write+0x1f8/0x4d0 [ 807.644558] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 807.649213] ? current_time+0x1c0/0x1c0 [ 807.653176] ? lock_acquire+0x170/0x3c0 [ 807.657135] __generic_file_write_iter+0x24b/0x610 [ 807.662053] generic_file_write_iter+0x3f8/0x730 [ 807.666801] __vfs_write+0x51b/0x770 [ 807.670509] ? kernel_read+0x110/0x110 [ 807.674390] ? check_preemption_disabled+0x41/0x280 [ 807.679399] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 807.684416] vfs_write+0x1f3/0x540 [ 807.687951] __x64_sys_pwrite64+0x1f7/0x250 [ 807.692261] ? ksys_pwrite64+0x1a0/0x1a0 [ 807.696320] ? trace_hardirqs_off_caller+0x6e/0x210 [ 807.701331] ? do_syscall_64+0x21/0x620 [ 807.705300] do_syscall_64+0xf9/0x620 [ 807.709095] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 807.714272] RIP: 0033:0x7ff4b2b9e017 [ 807.717972] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 807.736863] RSP: 002b:00007ff4b155ff00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 07:26:23 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 807.744555] RAX: ffffffffffffffda RBX: 00007ff4b2c349c8 RCX: 00007ff4b2b9e017 [ 807.751808] RDX: 000000000000000f RSI: 0000000020010000 RDI: 0000000000000004 [ 807.759062] RBP: 0000000000000003 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 807.766317] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 807.773567] R13: 0000000000000004 R14: 0000000020000180 R15: 0000000000000000 07:26:23 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:23 executing program 4: syz_mount_image$squashfs(0x0, &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:23 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 807.863659] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 807.872143] squashfs: SQUASHFS error: unable to read xattr id index table [ 807.904560] erofs: read_super, device -> /dev/loop2 [ 807.909594] erofs: options -> noacl,user_xattr, [ 807.934391] erofs: cannot find valid erofs superblock 07:26:23 executing program 4: syz_mount_image$squashfs(0x0, &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:23 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000399000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 808.098675] erofs: read_super, device -> /dev/loop1 [ 808.104525] erofs: read_super, device -> /dev/loop5 [ 808.109563] erofs: options -> noacl, 07:26:23 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 7) [ 808.140553] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 808.146458] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 808.159918] squashfs: SQUASHFS error: unable to read fragment index table [ 808.202394] erofs: root inode @ nid 0 [ 808.211019] squashfs: SQUASHFS error: unable to read xattr id index table [ 808.211552] erofs: root inode @ nid 0 [ 808.223958] erofs: bogus i_mode (0) @ nid 0 [ 808.226414] FAULT_INJECTION: forcing a failure. [ 808.226414] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 808.228545] erofs: bogus i_mode (0) @ nid 0 [ 808.240953] CPU: 1 PID: 29152 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 07:26:24 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), 0x0, 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 808.252677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 808.262024] Call Trace: [ 808.264618] dump_stack+0x1fc/0x2ef [ 808.268256] should_fail.cold+0xa/0xf [ 808.272060] ? lock_acquire+0x170/0x3c0 [ 808.276020] ? setup_fault_attr+0x200/0x200 [ 808.280331] __alloc_pages_nodemask+0x239/0x2890 [ 808.285085] ? __lock_acquire+0x6de/0x3ff0 [ 808.289306] ? static_obj+0x50/0x50 [ 808.292919] ? __lock_acquire+0x6de/0x3ff0 [ 808.297146] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 808.301981] ? __lock_acquire+0x6de/0x3ff0 [ 808.306203] ? mark_held_locks+0xf0/0xf0 [ 808.310257] ? unwind_next_frame+0xeee/0x1400 [ 808.314760] ? mark_held_locks+0xf0/0xf0 [ 808.318841] ? deref_stack_reg+0x134/0x1d0 [ 808.323055] ? get_reg+0x176/0x1f0 [ 808.326578] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 808.332461] alloc_pages_vma+0xf2/0x780 [ 808.336438] shmem_alloc_page+0x11c/0x1f0 [ 808.340570] ? shmem_swapin+0x220/0x220 [ 808.344537] ? percpu_counter_add_batch+0x126/0x180 [ 808.349552] ? __vm_enough_memory+0x316/0x650 [ 808.354049] shmem_alloc_and_acct_page+0x15a/0x850 [ 808.358975] shmem_getpage_gfp+0x4e9/0x37f0 [ 808.363294] ? shmem_alloc_and_acct_page+0x850/0x850 [ 808.368383] ? mark_held_locks+0xa6/0xf0 [ 808.372433] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 808.377618] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 808.382797] shmem_write_begin+0xff/0x1e0 [ 808.386946] generic_perform_write+0x1f8/0x4d0 [ 808.391520] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 808.396171] ? current_time+0x1c0/0x1c0 [ 808.400131] ? lock_acquire+0x170/0x3c0 [ 808.404105] __generic_file_write_iter+0x24b/0x610 [ 808.409022] generic_file_write_iter+0x3f8/0x730 [ 808.413766] __vfs_write+0x51b/0x770 [ 808.417461] ? kernel_read+0x110/0x110 [ 808.421337] ? check_preemption_disabled+0x41/0x280 [ 808.426341] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 808.431340] vfs_write+0x1f3/0x540 [ 808.434878] __x64_sys_pwrite64+0x1f7/0x250 [ 808.439192] ? ksys_pwrite64+0x1a0/0x1a0 [ 808.443236] ? trace_hardirqs_off_caller+0x6e/0x210 [ 808.448245] ? do_syscall_64+0x21/0x620 [ 808.452209] do_syscall_64+0xf9/0x620 [ 808.455996] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 808.461181] RIP: 0033:0x7ff4b2b9e017 [ 808.464884] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 808.483773] RSP: 002b:00007ff4b155ff00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 808.491461] RAX: ffffffffffffffda RBX: 00007ff4b2c349c8 RCX: 00007ff4b2b9e017 [ 808.498719] RDX: 000000000000000f RSI: 0000000020010000 RDI: 0000000000000004 [ 808.505979] RBP: 0000000000000003 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 808.513231] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 808.520487] R13: 0000000000000004 R14: 0000000020000180 R15: 0000000000000000 07:26:24 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f00400000039a000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:24 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:24 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) 07:26:24 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 808.672907] erofs: read_super, device -> /dev/loop2 [ 808.690241] erofs: options -> noacl,user_xattr, [ 808.703214] erofs: cannot find valid erofs superblock 07:26:24 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 8) 07:26:24 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 808.767150] erofs: read_super, device -> /dev/loop1 [ 808.772498] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 808.779908] erofs: root inode @ nid 0 [ 808.786058] erofs: bogus i_mode (0) @ nid 0 [ 808.792543] erofs: read_super, device -> /dev/loop5 [ 808.797568] erofs: options -> noacl, [ 808.803034] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 808.821153] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 808.828339] squashfs: SQUASHFS error: unable to read xattr id index table [ 808.829011] erofs: root inode @ nid 0 [ 808.837954] FAULT_INJECTION: forcing a failure. [ 808.837954] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 808.850981] CPU: 0 PID: 29183 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 808.858856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 808.867457] erofs: bogus i_mode (0) @ nid 0 [ 808.868201] Call Trace: [ 808.875093] dump_stack+0x1fc/0x2ef [ 808.878730] should_fail.cold+0xa/0xf [ 808.882540] ? setup_fault_attr+0x200/0x200 [ 808.886854] ? do_writepages+0x290/0x290 [ 808.890900] ? unlock_page+0x13d/0x230 [ 808.894789] __alloc_pages_nodemask+0x239/0x2890 [ 808.899539] ? lock_downgrade+0x720/0x720 [ 808.903682] ? check_preemption_disabled+0x41/0x280 [ 808.908692] ? __lock_acquire+0x6de/0x3ff0 [ 808.912925] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 808.917762] ? lock_downgrade+0x720/0x720 [ 808.921890] ? lock_acquire+0x170/0x3c0 [ 808.925859] ? up_write+0x18/0x150 [ 808.929383] ? generic_file_write_iter+0x381/0x730 [ 808.934303] ? iov_iter_init+0xb8/0x1d0 [ 808.938279] cache_grow_begin+0xa4/0x8a0 [ 808.942334] ? setup_fault_attr+0x200/0x200 [ 808.946662] ? lock_acquire+0x170/0x3c0 [ 808.950630] cache_alloc_refill+0x273/0x340 [ 808.954954] kmem_cache_alloc+0x346/0x370 [ 808.959107] getname_flags+0xce/0x590 [ 808.962913] do_sys_open+0x26c/0x520 [ 808.966624] ? filp_open+0x70/0x70 [ 808.970164] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 808.975533] ? trace_hardirqs_off_caller+0x6e/0x210 [ 808.980550] ? do_syscall_64+0x21/0x620 [ 808.984520] do_syscall_64+0xf9/0x620 [ 808.988325] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 808.993506] RIP: 0033:0x7ff4b2b9df64 [ 808.997208] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 07:26:24 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), 0x0, 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 809.016097] RSP: 002b:00007ff4b155feb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 809.023793] RAX: ffffffffffffffda RBX: 00007ff4b2c349c8 RCX: 00007ff4b2b9df64 [ 809.031042] RDX: 0000000000000002 RSI: 00007ff4b155ffe0 RDI: 00000000ffffff9c [ 809.038298] RBP: 00007ff4b155ffe0 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 809.045554] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 809.052810] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 07:26:24 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffff1f00, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:24 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040000026b1000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:24 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:25 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), 0x0, 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000000004000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) [ 809.227587] erofs: read_super, device -> /dev/loop2 [ 809.242382] erofs: options -> noacl,user_xattr, [ 809.249424] erofs: root inode @ nid 36 [ 809.254144] erofs: mounted on /dev/loop2 with opts: noacl. [ 809.279188] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 809.285576] erofs: read_super, device -> /dev/loop1 [ 809.291012] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 809.305582] erofs: cannot find valid erofs superblock [ 809.313520] erofs: read_super, device -> /dev/loop5 [ 809.314887] squashfs: SQUASHFS error: unable to read xattr id index table [ 809.318550] erofs: options -> noacl, 07:26:25 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f00400000edc0000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:25 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 9) [ 809.321097] erofs: root inode @ nid 0 [ 809.338241] erofs: bogus i_mode (0) @ nid 0 07:26:25 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000000004000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) [ 809.375819] erofs: unmounted for /dev/loop2 07:26:25 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffff7f, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:25 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 809.477841] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 809.516849] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 809.529997] squashfs: SQUASHFS error: unable to read xattr id index table [ 809.552744] FAULT_INJECTION: forcing a failure. [ 809.552744] name failslab, interval 1, probability 0, space 0, times 0 [ 809.564265] CPU: 0 PID: 29237 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 809.572136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 809.581594] Call Trace: [ 809.584170] dump_stack+0x1fc/0x2ef [ 809.587779] should_fail.cold+0xa/0xf [ 809.591560] ? setup_fault_attr+0x200/0x200 [ 809.595873] ? lock_acquire+0x170/0x3c0 [ 809.600362] __should_failslab+0x115/0x180 [ 809.604579] should_failslab+0x5/0x10 [ 809.608361] kmem_cache_alloc+0x277/0x370 [ 809.612502] __alloc_file+0x21/0x340 [ 809.616216] alloc_empty_file+0x6d/0x170 [ 809.620270] path_openat+0xe9/0x2df0 [ 809.623971] ? __lock_acquire+0x6de/0x3ff0 [ 809.628192] ? path_lookupat+0x8d0/0x8d0 [ 809.632254] ? mark_held_locks+0xf0/0xf0 [ 809.636321] do_filp_open+0x18c/0x3f0 [ 809.640116] ? may_open_dev+0xf0/0xf0 [ 809.643911] ? __alloc_fd+0x28d/0x570 [ 809.647714] ? lock_downgrade+0x720/0x720 [ 809.651853] ? lock_acquire+0x170/0x3c0 [ 809.655826] ? __alloc_fd+0x34/0x570 [ 809.659536] ? do_raw_spin_unlock+0x171/0x230 [ 809.664012] ? _raw_spin_unlock+0x29/0x40 [ 809.668144] ? __alloc_fd+0x28d/0x570 [ 809.671942] do_sys_open+0x3b3/0x520 [ 809.675660] ? filp_open+0x70/0x70 [ 809.679197] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 809.684542] ? trace_hardirqs_off_caller+0x6e/0x210 [ 809.689548] ? do_syscall_64+0x21/0x620 [ 809.693527] do_syscall_64+0xf9/0x620 [ 809.697324] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 809.702504] RIP: 0033:0x7ff4b2b9df64 [ 809.706209] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 809.725110] RSP: 002b:00007ff4b155feb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 809.732808] RAX: ffffffffffffffda RBX: 00007ff4b2c349c8 RCX: 00007ff4b2b9df64 [ 809.740071] RDX: 0000000000000002 RSI: 00007ff4b155ffe0 RDI: 00000000ffffff9c [ 809.747510] RBP: 00007ff4b155ffe0 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 809.754772] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 809.762042] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 07:26:25 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 10) [ 809.783837] ieee802154 phy0 wpan0: encryption failed: -22 [ 809.789433] ieee802154 phy1 wpan1: encryption failed: -22 [ 809.818229] erofs: read_super, device -> /dev/loop5 [ 809.827742] erofs: options -> noacl, 07:26:25 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 809.833854] erofs: root inode @ nid 0 [ 809.838124] erofs: bogus i_mode (0) @ nid 0 [ 809.852129] erofs: read_super, device -> /dev/loop1 [ 809.857261] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 809.873867] FAULT_INJECTION: forcing a failure. 07:26:25 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040013eb4d5000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 809.873867] name failslab, interval 1, probability 0, space 0, times 0 [ 809.875227] erofs: cannot find valid erofs superblock [ 809.903048] CPU: 0 PID: 29249 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 809.910942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 809.920281] Call Trace: [ 809.922876] dump_stack+0x1fc/0x2ef [ 809.926507] should_fail.cold+0xa/0xf [ 809.930297] ? setup_fault_attr+0x200/0x200 [ 809.934619] ? lock_acquire+0x170/0x3c0 [ 809.938591] __should_failslab+0x115/0x180 [ 809.942822] should_failslab+0x5/0x10 [ 809.946613] kmem_cache_alloc_trace+0x284/0x380 [ 809.951336] apparmor_file_alloc_security+0x394/0xad0 [ 809.956515] ? apparmor_file_receive+0x160/0x160 [ 809.961253] ? __alloc_file+0x21/0x340 [ 809.965129] security_file_alloc+0x40/0x90 [ 809.969358] __alloc_file+0xd8/0x340 [ 809.973071] alloc_empty_file+0x6d/0x170 [ 809.977129] path_openat+0xe9/0x2df0 [ 809.980848] ? __lock_acquire+0x6de/0x3ff0 [ 809.985081] ? path_lookupat+0x8d0/0x8d0 [ 809.989131] ? mark_held_locks+0xf0/0xf0 [ 809.993195] do_filp_open+0x18c/0x3f0 [ 809.996991] ? may_open_dev+0xf0/0xf0 [ 810.000785] ? __alloc_fd+0x28d/0x570 [ 810.004582] ? lock_downgrade+0x720/0x720 [ 810.008725] ? lock_acquire+0x170/0x3c0 [ 810.012687] ? __alloc_fd+0x34/0x570 [ 810.016402] ? do_raw_spin_unlock+0x171/0x230 [ 810.020892] ? _raw_spin_unlock+0x29/0x40 [ 810.025029] ? __alloc_fd+0x28d/0x570 [ 810.028817] do_sys_open+0x3b3/0x520 [ 810.032522] ? filp_open+0x70/0x70 [ 810.036053] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 810.041402] ? trace_hardirqs_off_caller+0x6e/0x210 [ 810.046409] ? do_syscall_64+0x21/0x620 [ 810.050367] do_syscall_64+0xf9/0x620 [ 810.054171] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 810.059526] RIP: 0033:0x7ff4b2b9df64 [ 810.063231] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 810.082217] RSP: 002b:00007ff4b155feb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 810.089919] RAX: ffffffffffffffda RBX: 00007ff4b2c349c8 RCX: 00007ff4b2b9df64 [ 810.097198] RDX: 0000000000000002 RSI: 00007ff4b155ffe0 RDI: 00000000ffffff9c [ 810.104449] RBP: 00007ff4b155ffe0 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 810.111703] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 810.119019] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 07:26:25 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 11) 07:26:25 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 810.159291] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 07:26:26 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040fffffff5000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:26 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:26 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x800, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 810.244750] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 810.314649] FAULT_INJECTION: forcing a failure. [ 810.314649] name failslab, interval 1, probability 0, space 0, times 0 [ 810.327390] CPU: 1 PID: 29263 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 810.335284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 810.344623] Call Trace: [ 810.347201] dump_stack+0x1fc/0x2ef [ 810.350817] should_fail.cold+0xa/0xf [ 810.354606] ? setup_fault_attr+0x200/0x200 [ 810.358909] ? lock_acquire+0x170/0x3c0 [ 810.362877] __should_failslab+0x115/0x180 [ 810.367108] should_failslab+0x5/0x10 [ 810.370907] kmem_cache_alloc_trace+0x284/0x380 [ 810.375561] ? loop_info64_to_compat+0x5e0/0x5e0 [ 810.380302] __kthread_create_on_node+0xd2/0x410 [ 810.385040] ? kthread_parkme+0xa0/0xa0 [ 810.389004] ? lock_acquire+0x170/0x3c0 [ 810.392974] ? lo_ioctl+0x1bb/0x20e0 [ 810.396689] ? __mutex_lock+0x368/0x1190 [ 810.400740] ? lock_downgrade+0x720/0x720 [ 810.404869] ? check_preemption_disabled+0x41/0x280 [ 810.409878] ? loop_info64_to_compat+0x5e0/0x5e0 [ 810.414637] kthread_create_on_node+0xbb/0xf0 [ 810.419117] ? __kthread_create_on_node+0x410/0x410 [ 810.424121] ? __fget+0x356/0x510 [ 810.427569] ? do_dup2+0x450/0x450 [ 810.431099] ? __lockdep_init_map+0x100/0x5a0 [ 810.435596] ? __lockdep_init_map+0x100/0x5a0 [ 810.440087] lo_ioctl+0xae5/0x20e0 [ 810.443614] ? loop_set_status64+0x110/0x110 [ 810.448006] blkdev_ioctl+0x5cb/0x1a80 [ 810.451888] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 810.457252] ? blkpg_ioctl+0x9d0/0x9d0 [ 810.461125] ? mark_held_locks+0xf0/0xf0 [ 810.465179] ? mark_held_locks+0xf0/0xf0 [ 810.469228] ? debug_check_no_obj_freed+0x201/0x490 [ 810.474250] ? lock_downgrade+0x720/0x720 [ 810.478384] block_ioctl+0xe9/0x130 [ 810.482002] ? blkdev_fallocate+0x3f0/0x3f0 [ 810.486313] do_vfs_ioctl+0xcdb/0x12e0 [ 810.490193] ? lock_downgrade+0x720/0x720 [ 810.494326] ? check_preemption_disabled+0x41/0x280 [ 810.499330] ? ioctl_preallocate+0x200/0x200 [ 810.503735] ? __fget+0x356/0x510 [ 810.507180] ? do_dup2+0x450/0x450 [ 810.510706] ? do_sys_open+0x2bf/0x520 [ 810.514580] ksys_ioctl+0x9b/0xc0 [ 810.518025] __x64_sys_ioctl+0x6f/0xb0 [ 810.521905] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 810.526469] do_syscall_64+0xf9/0x620 [ 810.530252] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 810.535429] RIP: 0033:0x7ff4b2beae07 [ 810.539130] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 810.558016] RSP: 002b:00007ff4b155ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 810.565717] RAX: ffffffffffffffda RBX: 00007ff4b2c349c8 RCX: 00007ff4b2beae07 [ 810.572968] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 810.580219] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 810.587466] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 810.594712] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 07:26:26 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040fffffff6000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 810.683806] erofs: read_super, device -> /dev/loop5 [ 810.689287] erofs: options -> noacl, [ 810.701359] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 [ 810.701424] erofs: root inode @ nid 0 07:26:26 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 12) 07:26:26 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 810.752159] erofs: bogus i_mode (0) @ nid 0 [ 810.774941] erofs: read_super, device -> /dev/loop1 07:26:26 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 810.809150] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 810.832084] erofs: cannot find valid erofs superblock [ 810.853458] FAULT_INJECTION: forcing a failure. [ 810.853458] name failslab, interval 1, probability 0, space 0, times 0 [ 810.864884] CPU: 0 PID: 29293 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 810.872762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 810.882109] Call Trace: [ 810.884696] dump_stack+0x1fc/0x2ef [ 810.888311] should_fail.cold+0xa/0xf [ 810.892105] ? setup_fault_attr+0x200/0x200 [ 810.896428] ? lock_acquire+0x170/0x3c0 [ 810.900394] __should_failslab+0x115/0x180 [ 810.904615] should_failslab+0x5/0x10 [ 810.908404] kmem_cache_alloc+0x277/0x370 [ 810.912556] __kernfs_new_node+0xd2/0x680 [ 810.916698] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 810.921446] ? kernfs_activate+0x2c/0x1d0 [ 810.925585] ? lock_downgrade+0x720/0x720 [ 810.929712] ? kernfs_add_one+0x51/0x4c0 [ 810.933762] ? mutex_trylock+0x1a0/0x1a0 [ 810.937822] ? __mutex_unlock_slowpath+0xea/0x610 [ 810.942661] kernfs_new_node+0x92/0x120 [ 810.946636] __kernfs_create_file+0x51/0x340 [ 810.951033] sysfs_add_file_mode_ns+0x226/0x540 [ 810.955703] internal_create_group+0x355/0xb20 [ 810.960276] ? sysfs_remove_link_from_group+0x70/0x70 [ 810.965450] ? lock_downgrade+0x720/0x720 [ 810.969604] lo_ioctl+0xf7c/0x20e0 [ 810.973140] ? loop_set_status64+0x110/0x110 [ 810.977552] blkdev_ioctl+0x5cb/0x1a80 [ 810.981434] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 810.986780] ? blkpg_ioctl+0x9d0/0x9d0 [ 810.990652] ? mark_held_locks+0xf0/0xf0 [ 810.994707] ? mark_held_locks+0xf0/0xf0 [ 810.998760] ? debug_check_no_obj_freed+0x201/0x490 [ 811.003760] ? lock_downgrade+0x720/0x720 [ 811.007891] block_ioctl+0xe9/0x130 [ 811.011503] ? blkdev_fallocate+0x3f0/0x3f0 [ 811.015823] do_vfs_ioctl+0xcdb/0x12e0 [ 811.019722] ? lock_downgrade+0x720/0x720 [ 811.023861] ? check_preemption_disabled+0x41/0x280 [ 811.028870] ? ioctl_preallocate+0x200/0x200 [ 811.033279] ? __fget+0x356/0x510 [ 811.036724] ? do_dup2+0x450/0x450 [ 811.040250] ? do_sys_open+0x2bf/0x520 [ 811.044135] ksys_ioctl+0x9b/0xc0 [ 811.047581] __x64_sys_ioctl+0x6f/0xb0 [ 811.051449] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 811.056020] do_syscall_64+0xf9/0x620 [ 811.059815] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 811.064992] RIP: 0033:0x7ff4b2beae07 [ 811.068708] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 811.087605] RSP: 002b:00007ff4b155ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 811.095300] RAX: ffffffffffffffda RBX: 00007ff4b2c349c8 RCX: 00007ff4b2beae07 [ 811.102563] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 811.109819] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 811.117071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 811.124321] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 07:26:26 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}, {}]}) [ 811.155921] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 811.192628] erofs: read_super, device -> /dev/loop2 07:26:26 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040fffffffb000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:26 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 811.213270] erofs: options -> noacl,user_xattr, [ 811.220690] erofs: root inode @ nid 36 [ 811.224811] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:27 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 13) 07:26:27 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 811.300846] erofs: unmounted for /dev/loop2 [ 811.332352] erofs: read_super, device -> /dev/loop5 [ 811.341653] erofs: options -> noacl, [ 811.347981] erofs: root inode @ nid 0 [ 811.368779] erofs: bogus i_mode (0) @ nid 0 07:26:27 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xedc000000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:27 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040fffffdfc000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:27 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) [ 811.411710] erofs: read_super, device -> /dev/loop1 [ 811.417097] erofs: options -> noacl,noacl,nouser_xattr,noacl,user_xattr, [ 811.425428] erofs: root inode @ nid 36 [ 811.429643] erofs: mounted on /dev/loop1 with opts: noacl. [ 811.442333] FAULT_INJECTION: forcing a failure. [ 811.442333] name failslab, interval 1, probability 0, space 0, times 0 [ 811.458294] erofs: unmounted for /dev/loop1 [ 811.471292] CPU: 1 PID: 29324 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 811.479187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 811.488538] Call Trace: [ 811.491124] dump_stack+0x1fc/0x2ef [ 811.494752] should_fail.cold+0xa/0xf [ 811.498538] ? setup_fault_attr+0x200/0x200 [ 811.502850] ? lock_acquire+0x170/0x3c0 [ 811.506808] __should_failslab+0x115/0x180 [ 811.511027] should_failslab+0x5/0x10 [ 811.514805] kmem_cache_alloc+0x277/0x370 [ 811.518947] __kernfs_new_node+0xd2/0x680 [ 811.523087] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 811.527825] ? kernfs_activate+0x2c/0x1d0 [ 811.531956] ? lock_downgrade+0x720/0x720 [ 811.536089] ? kernfs_add_one+0x51/0x4c0 [ 811.540133] ? mutex_trylock+0x1a0/0x1a0 [ 811.544195] ? __mutex_unlock_slowpath+0xea/0x610 [ 811.549019] kernfs_new_node+0x92/0x120 [ 811.552978] __kernfs_create_file+0x51/0x340 [ 811.557372] sysfs_add_file_mode_ns+0x226/0x540 [ 811.562026] internal_create_group+0x355/0xb20 [ 811.566596] ? sysfs_remove_link_from_group+0x70/0x70 [ 811.571768] ? lock_downgrade+0x720/0x720 [ 811.575905] lo_ioctl+0xf7c/0x20e0 [ 811.579430] ? loop_set_status64+0x110/0x110 [ 811.583823] blkdev_ioctl+0x5cb/0x1a80 [ 811.587691] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 811.593035] ? blkpg_ioctl+0x9d0/0x9d0 [ 811.596903] ? mark_held_locks+0xf0/0xf0 [ 811.600944] ? mark_held_locks+0xf0/0xf0 [ 811.604989] ? debug_check_no_obj_freed+0x201/0x490 [ 811.609997] ? lock_downgrade+0x720/0x720 [ 811.614137] block_ioctl+0xe9/0x130 [ 811.617751] ? blkdev_fallocate+0x3f0/0x3f0 [ 811.622064] do_vfs_ioctl+0xcdb/0x12e0 [ 811.625930] ? lock_downgrade+0x720/0x720 [ 811.630060] ? check_preemption_disabled+0x41/0x280 [ 811.635057] ? ioctl_preallocate+0x200/0x200 [ 811.639447] ? __fget+0x356/0x510 [ 811.642883] ? do_dup2+0x450/0x450 [ 811.646411] ? do_sys_open+0x2bf/0x520 [ 811.650293] ksys_ioctl+0x9b/0xc0 [ 811.653732] __x64_sys_ioctl+0x6f/0xb0 [ 811.657601] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 811.662165] do_syscall_64+0xf9/0x620 [ 811.665960] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 811.671139] RIP: 0033:0x7ff4b2beae07 [ 811.674833] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 811.693726] RSP: 002b:00007ff4b155ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 811.701417] RAX: ffffffffffffffda RBX: 00007ff4b2c349c8 RCX: 00007ff4b2beae07 [ 811.708669] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 811.715919] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 811.723169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 811.730417] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 [ 811.739599] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 811.755216] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 07:26:27 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:27 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x0, 0x0, 0x0, &(0x7f0000000080)) [ 811.851473] erofs: read_super, device -> /dev/loop2 [ 811.863528] erofs: options -> noacl,user_xattr, [ 811.886987] erofs: root inode @ nid 36 [ 811.899884] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:27 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 14) 07:26:27 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) 07:26:27 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 811.922954] erofs: read_super, device -> /dev/loop5 [ 811.928280] erofs: options -> noacl, [ 811.934231] erofs: root inode @ nid 0 [ 811.938257] erofs: bogus i_mode (0) @ nid 0 [ 811.962634] erofs: unmounted for /dev/loop2 07:26:27 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x0, 0x0, 0x0, &(0x7f0000000080)) 07:26:27 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040fffffdfd000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:27 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x0, 0x0, 0x0, &(0x7f0000000080)) [ 812.069146] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 812.172913] FAULT_INJECTION: forcing a failure. [ 812.172913] name failslab, interval 1, probability 0, space 0, times 0 [ 812.184254] CPU: 1 PID: 29368 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 812.192121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 812.201489] Call Trace: [ 812.204086] dump_stack+0x1fc/0x2ef [ 812.207704] should_fail.cold+0xa/0xf [ 812.211500] ? setup_fault_attr+0x200/0x200 [ 812.215831] ? lock_acquire+0x170/0x3c0 [ 812.219791] __should_failslab+0x115/0x180 [ 812.224009] should_failslab+0x5/0x10 [ 812.227791] kmem_cache_alloc+0x277/0x370 [ 812.231939] __kernfs_new_node+0xd2/0x680 [ 812.236084] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 812.240842] ? __mutex_unlock_slowpath+0xea/0x610 [ 812.245669] ? wait_for_completion_io+0x10/0x10 [ 812.250326] ? kernfs_next_descendant_post+0x19c/0x290 [ 812.255586] kernfs_new_node+0x92/0x120 [ 812.259542] __kernfs_create_file+0x51/0x340 [ 812.263936] sysfs_add_file_mode_ns+0x226/0x540 [ 812.268592] internal_create_group+0x355/0xb20 [ 812.273164] ? sysfs_remove_link_from_group+0x70/0x70 [ 812.278344] ? lock_downgrade+0x720/0x720 [ 812.282486] lo_ioctl+0xf7c/0x20e0 [ 812.286019] ? loop_set_status64+0x110/0x110 [ 812.290408] blkdev_ioctl+0x5cb/0x1a80 [ 812.294281] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 812.299636] ? blkpg_ioctl+0x9d0/0x9d0 [ 812.303528] ? mark_held_locks+0xf0/0xf0 [ 812.307570] ? mark_held_locks+0xf0/0xf0 [ 812.311615] ? debug_check_no_obj_freed+0x201/0x490 [ 812.316614] ? lock_downgrade+0x720/0x720 [ 812.320749] block_ioctl+0xe9/0x130 [ 812.324354] ? blkdev_fallocate+0x3f0/0x3f0 [ 812.328680] do_vfs_ioctl+0xcdb/0x12e0 [ 812.332551] ? lock_downgrade+0x720/0x720 [ 812.336696] ? check_preemption_disabled+0x41/0x280 [ 812.341700] ? ioctl_preallocate+0x200/0x200 [ 812.346100] ? __fget+0x356/0x510 [ 812.349545] ? do_dup2+0x450/0x450 [ 812.353076] ? do_sys_open+0x2bf/0x520 [ 812.356956] ksys_ioctl+0x9b/0xc0 [ 812.360405] __x64_sys_ioctl+0x6f/0xb0 [ 812.364553] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 812.369119] do_syscall_64+0xf9/0x620 [ 812.372916] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 812.378098] RIP: 0033:0x7ff4b2beae07 [ 812.381811] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 812.400796] RSP: 002b:00007ff4b155ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 812.408494] RAX: ffffffffffffffda RBX: 00007ff4b2c349c8 RCX: 00007ff4b2beae07 [ 812.415747] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 812.422994] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 812.430245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 812.437514] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 [ 812.460856] erofs: read_super, device -> /dev/loop5 [ 812.467027] erofs: read_super, device -> /dev/loop2 07:26:28 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040fffffffd000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:28 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:28 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000080)) [ 812.474753] erofs: options -> noacl, [ 812.483389] erofs: root inode @ nid 0 [ 812.488660] erofs: options -> noacl,user_xattr, [ 812.497120] erofs: bogus i_mode (0) @ nid 0 [ 812.510266] erofs: root inode @ nid 36 [ 812.516023] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:28 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 15) 07:26:28 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) 07:26:28 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 812.603922] erofs: unmounted for /dev/loop2 07:26:28 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}]}) [ 812.643364] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 [ 812.669227] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 812.772500] FAULT_INJECTION: forcing a failure. [ 812.772500] name failslab, interval 1, probability 0, space 0, times 0 [ 812.784013] CPU: 0 PID: 29410 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 812.791897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 812.801240] Call Trace: [ 812.803828] dump_stack+0x1fc/0x2ef [ 812.807472] should_fail.cold+0xa/0xf [ 812.811273] ? setup_fault_attr+0x200/0x200 [ 812.815597] ? lock_acquire+0x170/0x3c0 [ 812.819559] __should_failslab+0x115/0x180 [ 812.823790] should_failslab+0x5/0x10 [ 812.827579] kmem_cache_alloc+0x277/0x370 [ 812.831745] __kernfs_new_node+0xd2/0x680 [ 812.835965] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 812.840706] ? __mutex_unlock_slowpath+0xea/0x610 [ 812.845543] ? wait_for_completion_io+0x10/0x10 [ 812.850199] ? kernfs_next_descendant_post+0x19c/0x290 [ 812.855473] kernfs_new_node+0x92/0x120 [ 812.859434] __kernfs_create_file+0x51/0x340 [ 812.863842] sysfs_add_file_mode_ns+0x226/0x540 [ 812.868502] internal_create_group+0x355/0xb20 [ 812.873065] ? sysfs_remove_link_from_group+0x70/0x70 [ 812.878231] ? lock_downgrade+0x720/0x720 [ 812.882377] lo_ioctl+0xf7c/0x20e0 [ 812.885921] ? loop_set_status64+0x110/0x110 [ 812.890320] blkdev_ioctl+0x5cb/0x1a80 [ 812.894200] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 812.899553] ? blkpg_ioctl+0x9d0/0x9d0 [ 812.903432] ? mark_held_locks+0xf0/0xf0 [ 812.907492] ? mark_held_locks+0xf0/0xf0 [ 812.911545] ? debug_check_no_obj_freed+0x201/0x490 [ 812.916544] ? lock_downgrade+0x720/0x720 [ 812.920675] block_ioctl+0xe9/0x130 [ 812.924286] ? blkdev_fallocate+0x3f0/0x3f0 [ 812.928603] do_vfs_ioctl+0xcdb/0x12e0 [ 812.932472] ? lock_downgrade+0x720/0x720 [ 812.936599] ? check_preemption_disabled+0x41/0x280 [ 812.941604] ? ioctl_preallocate+0x200/0x200 [ 812.946005] ? __fget+0x356/0x510 [ 812.949447] ? do_dup2+0x450/0x450 [ 812.952978] ? do_sys_open+0x2bf/0x520 [ 812.956847] ksys_ioctl+0x9b/0xc0 [ 812.960278] __x64_sys_ioctl+0x6f/0xb0 [ 812.964157] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 812.968731] do_syscall_64+0xf9/0x620 [ 812.972535] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 812.977721] RIP: 0033:0x7ff4b2beae07 [ 812.981443] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 813.000323] RSP: 002b:00007ff4b155ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 813.008011] RAX: ffffffffffffffda RBX: 00007ff4b2c349c8 RCX: 00007ff4b2beae07 [ 813.015258] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 813.022512] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 813.029768] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 813.037013] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 07:26:28 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000080)) 07:26:28 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000fff000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 813.127983] erofs: read_super, device -> /dev/loop2 [ 813.128765] erofs: read_super, device -> /dev/loop5 [ 813.144317] erofs: options -> noacl,user_xattr, [ 813.156032] erofs: root inode @ nid 36 [ 813.159410] erofs: options -> noacl, [ 813.172671] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:28 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000000050000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) [ 813.180145] erofs: root inode @ nid 0 [ 813.191378] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 813.201176] squashfs: SQUASHFS error: unable to read xattr id index table [ 813.201189] erofs: bogus i_mode (0) @ nid 0 [ 813.217296] erofs: read_super, device -> /dev/loop1 07:26:28 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 16) [ 813.232487] erofs: options -> noacl,noacl,nouser_xattr,noacl, [ 813.238442] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 [ 813.244424] erofs: root inode @ nid 36 [ 813.250062] erofs: unmounted for /dev/loop2 [ 813.254691] erofs: mounted on /dev/loop1 with opts: noacl. [ 813.261904] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 07:26:29 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040001fffff000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:29 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000080)) 07:26:29 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}]}) 07:26:29 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000020006000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:29 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 813.469610] erofs: unmounted for /dev/loop1 [ 813.545466] FAULT_INJECTION: forcing a failure. [ 813.545466] name failslab, interval 1, probability 0, space 0, times 0 [ 813.559165] CPU: 0 PID: 29454 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 813.567049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 813.576388] Call Trace: [ 813.578973] dump_stack+0x1fc/0x2ef [ 813.582589] should_fail.cold+0xa/0xf [ 813.586381] ? setup_fault_attr+0x200/0x200 [ 813.590694] ? lock_acquire+0x170/0x3c0 [ 813.594657] __should_failslab+0x115/0x180 [ 813.598874] should_failslab+0x5/0x10 [ 813.602656] kmem_cache_alloc+0x277/0x370 [ 813.606793] __kernfs_new_node+0xd2/0x680 [ 813.610946] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 813.615703] ? __mutex_unlock_slowpath+0xea/0x610 [ 813.620533] ? wait_for_completion_io+0x10/0x10 [ 813.625203] ? kernfs_next_descendant_post+0x19c/0x290 [ 813.630673] kernfs_new_node+0x92/0x120 [ 813.634644] __kernfs_create_file+0x51/0x340 [ 813.639039] sysfs_add_file_mode_ns+0x226/0x540 [ 813.643699] internal_create_group+0x355/0xb20 [ 813.648287] ? sysfs_remove_link_from_group+0x70/0x70 [ 813.653477] ? lock_downgrade+0x720/0x720 [ 813.657631] lo_ioctl+0xf7c/0x20e0 [ 813.661164] ? loop_set_status64+0x110/0x110 [ 813.665555] blkdev_ioctl+0x5cb/0x1a80 [ 813.669437] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 813.674791] ? blkpg_ioctl+0x9d0/0x9d0 [ 813.678662] ? mark_held_locks+0xf0/0xf0 [ 813.682705] ? mark_held_locks+0xf0/0xf0 [ 813.686749] ? debug_check_no_obj_freed+0x201/0x490 [ 813.691763] ? lock_downgrade+0x720/0x720 [ 813.695899] block_ioctl+0xe9/0x130 [ 813.699506] ? blkdev_fallocate+0x3f0/0x3f0 [ 813.703818] do_vfs_ioctl+0xcdb/0x12e0 [ 813.707690] ? lock_downgrade+0x720/0x720 [ 813.711838] ? check_preemption_disabled+0x41/0x280 [ 813.716836] ? ioctl_preallocate+0x200/0x200 [ 813.721231] ? __fget+0x356/0x510 [ 813.724669] ? do_dup2+0x450/0x450 [ 813.728193] ? do_sys_open+0x2bf/0x520 [ 813.732065] ksys_ioctl+0x9b/0xc0 [ 813.735501] __x64_sys_ioctl+0x6f/0xb0 [ 813.739371] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 813.743944] do_syscall_64+0xf9/0x620 [ 813.747736] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 813.752907] RIP: 0033:0x7ff4b2beae07 [ 813.756599] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 813.775477] RSP: 002b:00007ff4b155ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 813.783166] RAX: ffffffffffffffda RBX: 00007ff4b2c349c8 RCX: 00007ff4b2beae07 07:26:29 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040fcfdffff000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 813.790414] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 813.797661] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 813.804910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 813.812160] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 [ 813.863836] erofs: read_super, device -> /dev/loop2 [ 813.869241] erofs: options -> noacl,user_xattr, [ 813.883491] squashfs: SQUASHFS error: unable to read fragment index table [ 813.885312] erofs: read_super, device -> /dev/loop1 [ 813.896564] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 [ 813.901875] erofs: read_super, device -> /dev/loop5 [ 813.909106] erofs: options -> noacl, [ 813.911989] erofs: root inode @ nid 36 [ 813.931016] erofs: mounted on /dev/loop2 with opts: noacl. [ 813.932462] erofs: root inode @ nid 0 [ 813.942896] erofs: options -> noacl,noacl,nouser_xattr,noacl, [ 813.960043] erofs: root inode @ nid 36 07:26:29 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:29 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000000080)) [ 813.964774] erofs: mounted on /dev/loop1 with opts: noacl. [ 813.972115] erofs: bogus i_mode (0) @ nid 0 07:26:29 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 17) 07:26:29 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {@noacl}]}) 07:26:29 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040fdfdffff000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 814.050666] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 [ 814.061804] erofs: unmounted for /dev/loop2 [ 814.067395] erofs: unmounted for /dev/loop1 07:26:29 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 814.169487] squashfs: SQUASHFS error: unable to read fragment index table 07:26:29 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000000080)) [ 814.265989] FAULT_INJECTION: forcing a failure. [ 814.265989] name failslab, interval 1, probability 0, space 0, times 0 [ 814.278154] CPU: 0 PID: 29499 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 814.286047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 814.295399] Call Trace: [ 814.297996] dump_stack+0x1fc/0x2ef [ 814.301628] should_fail.cold+0xa/0xf [ 814.305416] ? setup_fault_attr+0x200/0x200 [ 814.309721] ? lock_acquire+0x170/0x3c0 [ 814.313693] __should_failslab+0x115/0x180 [ 814.317928] should_failslab+0x5/0x10 [ 814.321727] kmem_cache_alloc+0x277/0x370 [ 814.325858] __kernfs_new_node+0xd2/0x680 [ 814.329989] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 814.334746] ? __mutex_unlock_slowpath+0xea/0x610 [ 814.339583] ? wait_for_completion_io+0x10/0x10 [ 814.344238] ? kernfs_next_descendant_post+0x19c/0x290 [ 814.349497] kernfs_new_node+0x92/0x120 [ 814.353466] __kernfs_create_file+0x51/0x340 [ 814.357867] sysfs_add_file_mode_ns+0x226/0x540 [ 814.362531] internal_create_group+0x355/0xb20 [ 814.367103] ? sysfs_remove_link_from_group+0x70/0x70 [ 814.372292] ? lock_downgrade+0x720/0x720 [ 814.376447] lo_ioctl+0xf7c/0x20e0 [ 814.379979] ? loop_set_status64+0x110/0x110 [ 814.384368] blkdev_ioctl+0x5cb/0x1a80 [ 814.388262] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 814.393615] ? blkpg_ioctl+0x9d0/0x9d0 [ 814.397506] ? mark_held_locks+0xf0/0xf0 [ 814.401566] ? mark_held_locks+0xf0/0xf0 [ 814.405616] ? debug_check_no_obj_freed+0x201/0x490 [ 814.410615] ? lock_downgrade+0x720/0x720 [ 814.414756] block_ioctl+0xe9/0x130 [ 814.418378] ? blkdev_fallocate+0x3f0/0x3f0 [ 814.422681] do_vfs_ioctl+0xcdb/0x12e0 [ 814.426555] ? lock_downgrade+0x720/0x720 [ 814.430708] ? check_preemption_disabled+0x41/0x280 [ 814.435720] ? ioctl_preallocate+0x200/0x200 [ 814.440135] ? __fget+0x356/0x510 [ 814.443586] ? do_dup2+0x450/0x450 [ 814.447108] ? do_sys_open+0x2bf/0x520 [ 814.450978] ksys_ioctl+0x9b/0xc0 [ 814.454427] __x64_sys_ioctl+0x6f/0xb0 [ 814.458327] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 814.462893] do_syscall_64+0xf9/0x620 [ 814.466692] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 814.471877] RIP: 0033:0x7ff4b2beae07 [ 814.475587] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 814.494489] RSP: 002b:00007ff4b155ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 814.502188] RAX: ffffffffffffffda RBX: 00007ff4b2c349c8 RCX: 00007ff4b2beae07 [ 814.509438] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 07:26:30 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f00407fffffff000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 814.516700] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 814.523959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 814.531214] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 07:26:30 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000040006000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) [ 814.591895] erofs: read_super, device -> /dev/loop2 [ 814.596941] erofs: options -> noacl,user_xattr, [ 814.603368] erofs: root inode @ nid 36 [ 814.607485] erofs: mounted on /dev/loop2 with opts: noacl. [ 814.617347] erofs: read_super, device -> /dev/loop1 [ 814.622830] erofs: read_super, device -> /dev/loop5 07:26:30 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 18) [ 814.640928] erofs: options -> noacl,noacl,nouser_xattr,noacl, [ 814.652122] erofs: unmounted for /dev/loop2 [ 814.652752] erofs: options -> noacl, [ 814.664931] erofs: root inode @ nid 36 [ 814.669541] erofs: root inode @ nid 0 [ 814.675379] erofs: mounted on /dev/loop1 with opts: noacl. [ 814.680114] erofs: bogus i_mode (0) @ nid 0 07:26:30 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f00408cffffff000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 814.691478] squashfs: SQUASHFS error: unable to read fragment index table [ 814.722105] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 07:26:30 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 814.756534] FAULT_INJECTION: forcing a failure. [ 814.756534] name failslab, interval 1, probability 0, space 0, times 0 [ 814.777007] CPU: 1 PID: 29533 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 814.784899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 814.794235] Call Trace: [ 814.796809] dump_stack+0x1fc/0x2ef [ 814.800420] should_fail.cold+0xa/0xf [ 814.804202] ? setup_fault_attr+0x200/0x200 [ 814.808503] ? lock_acquire+0x170/0x3c0 [ 814.812461] ? dev_uevent_filter+0xd0/0xd0 [ 814.816709] __should_failslab+0x115/0x180 [ 814.820930] should_failslab+0x5/0x10 [ 814.824712] kmem_cache_alloc_trace+0x284/0x380 [ 814.829365] ? dev_uevent_filter+0xd0/0xd0 [ 814.833592] kobject_uevent_env+0x236/0x1480 [ 814.838001] lo_ioctl+0xff9/0x20e0 [ 814.841547] ? loop_set_status64+0x110/0x110 [ 814.845939] blkdev_ioctl+0x5cb/0x1a80 [ 814.849905] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 814.855259] ? blkpg_ioctl+0x9d0/0x9d0 [ 814.859130] ? mark_held_locks+0xf0/0xf0 [ 814.863174] ? mark_held_locks+0xf0/0xf0 [ 814.867221] ? debug_check_no_obj_freed+0x201/0x490 [ 814.872238] ? lock_downgrade+0x720/0x720 [ 814.876376] block_ioctl+0xe9/0x130 [ 814.879991] ? blkdev_fallocate+0x3f0/0x3f0 [ 814.884299] do_vfs_ioctl+0xcdb/0x12e0 [ 814.888169] ? lock_downgrade+0x720/0x720 [ 814.892301] ? check_preemption_disabled+0x41/0x280 [ 814.897296] ? ioctl_preallocate+0x200/0x200 [ 814.901698] ? __fget+0x356/0x510 [ 814.905134] ? do_dup2+0x450/0x450 [ 814.908652] ? do_sys_open+0x2bf/0x520 [ 814.912522] ksys_ioctl+0x9b/0xc0 [ 814.915956] __x64_sys_ioctl+0x6f/0xb0 [ 814.919828] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 814.924399] do_syscall_64+0xf9/0x620 [ 814.928181] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 814.933352] RIP: 0033:0x7ff4b2beae07 [ 814.937046] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:26:30 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {@noacl}, {@nouser_xattr}, {}]}) [ 814.956011] RSP: 002b:00007ff4b155ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 814.963700] RAX: ffffffffffffffda RBX: 00007ff4b2c349c8 RCX: 00007ff4b2beae07 [ 814.970969] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 814.978219] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 814.985468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 814.992717] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 [ 815.024198] erofs: unmounted for /dev/loop1 07:26:30 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:30 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000000080)) [ 815.144825] erofs: read_super, device -> /dev/loop2 07:26:30 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004097ffffff000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:30 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000050006000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) [ 815.172453] erofs: options -> noacl,user_xattr, [ 815.191931] erofs: root inode @ nid 36 [ 815.206980] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:31 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 19) [ 815.240783] erofs: read_super, device -> /dev/loop5 [ 815.250494] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 [ 815.255467] erofs: options -> noacl, [ 815.265969] erofs: unmounted for /dev/loop2 [ 815.270941] erofs: root inode @ nid 0 [ 815.286032] erofs: bogus i_mode (0) @ nid 0 07:26:31 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040f5ffffff000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:31 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 815.313103] erofs: read_super, device -> /dev/loop1 [ 815.318153] erofs: options -> noacl,noacl,nouser_xattr,user_xattr, [ 815.336822] squashfs: SQUASHFS error: unable to read fragment index table [ 815.352706] erofs: root inode @ nid 36 07:26:31 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)}], 0x0, &(0x7f0000000080)) [ 815.370635] erofs: mounted on /dev/loop1 with opts: noacl. 07:26:31 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:31 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {@noacl}, {}]}) [ 815.501417] FAULT_INJECTION: forcing a failure. [ 815.501417] name failslab, interval 1, probability 0, space 0, times 0 [ 815.522396] CPU: 0 PID: 29575 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 815.524055] erofs: unmounted for /dev/loop1 [ 815.530301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 815.544008] Call Trace: [ 815.546598] dump_stack+0x1fc/0x2ef [ 815.550215] should_fail.cold+0xa/0xf [ 815.554008] ? setup_fault_attr+0x200/0x200 [ 815.558330] ? lock_acquire+0x170/0x3c0 [ 815.562310] ? dev_uevent_filter+0xd0/0xd0 [ 815.566540] __should_failslab+0x115/0x180 [ 815.570771] should_failslab+0x5/0x10 [ 815.574578] kmem_cache_alloc_trace+0x284/0x380 [ 815.579241] ? dev_uevent_filter+0xd0/0xd0 [ 815.583469] kobject_uevent_env+0x236/0x1480 [ 815.587888] lo_ioctl+0xff9/0x20e0 [ 815.591422] ? loop_set_status64+0x110/0x110 [ 815.595810] blkdev_ioctl+0x5cb/0x1a80 [ 815.599680] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 815.605023] ? blkpg_ioctl+0x9d0/0x9d0 [ 815.608904] ? mark_held_locks+0xf0/0xf0 [ 815.612956] ? mark_held_locks+0xf0/0xf0 [ 815.617023] ? debug_check_no_obj_freed+0x201/0x490 [ 815.622037] ? lock_downgrade+0x720/0x720 [ 815.626167] block_ioctl+0xe9/0x130 [ 815.629774] ? blkdev_fallocate+0x3f0/0x3f0 [ 815.634079] do_vfs_ioctl+0xcdb/0x12e0 [ 815.637958] ? lock_downgrade+0x720/0x720 [ 815.642087] ? check_preemption_disabled+0x41/0x280 [ 815.647084] ? ioctl_preallocate+0x200/0x200 [ 815.651488] ? __fget+0x356/0x510 [ 815.654951] ? do_dup2+0x450/0x450 [ 815.658489] ? do_sys_open+0x2bf/0x520 [ 815.662379] ksys_ioctl+0x9b/0xc0 [ 815.665820] __x64_sys_ioctl+0x6f/0xb0 [ 815.669775] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 815.674338] do_syscall_64+0xf9/0x620 [ 815.678133] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 815.683310] RIP: 0033:0x7ff4b2beae07 [ 815.687011] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 815.705905] RSP: 002b:00007ff4b155ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 815.713601] RAX: ffffffffffffffda RBX: 00007ff4b2c349c8 RCX: 00007ff4b2beae07 [ 815.720848] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 815.728095] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 815.735386] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 815.742644] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 [ 815.777596] erofs: read_super, device -> /dev/loop2 [ 815.783870] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 [ 815.785256] erofs: options -> noacl,user_xattr, [ 815.809466] erofs: read_super, device -> /dev/loop5 [ 815.816772] erofs: root inode @ nid 36 [ 815.829979] erofs: options -> noacl, [ 815.831850] squashfs: SQUASHFS error: unable to read fragment index table [ 815.847617] erofs: root inode @ nid 0 [ 815.850586] erofs: mounted on /dev/loop2 with opts: noacl. [ 815.858308] erofs: bogus i_mode (0) @ nid 0 07:26:31 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040f6ffffff000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:31 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 20) 07:26:31 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 815.953131] erofs: unmounted for /dev/loop2 07:26:31 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)}], 0x0, &(0x7f0000000080)) 07:26:31 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 815.997737] erofs: read_super, device -> /dev/loop1 [ 816.014215] erofs: options -> noacl,noacl,user_xattr, [ 816.039162] erofs: root inode @ nid 36 [ 816.049274] erofs: mounted on /dev/loop1 with opts: noacl. 07:26:31 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) 07:26:31 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040fbffffff000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 816.084133] squashfs: SQUASHFS error: unable to read fragment index table [ 816.087210] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 [ 816.103518] erofs: unmounted for /dev/loop1 07:26:32 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)}], 0x0, &(0x7f0000000080)) [ 816.246212] FAULT_INJECTION: forcing a failure. [ 816.246212] name failslab, interval 1, probability 0, space 0, times 0 [ 816.263407] CPU: 1 PID: 29624 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 816.271298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 816.280643] Call Trace: [ 816.283218] dump_stack+0x1fc/0x2ef [ 816.286834] should_fail.cold+0xa/0xf [ 816.290627] ? setup_fault_attr+0x200/0x200 [ 816.294930] ? lock_acquire+0x170/0x3c0 [ 816.298892] __should_failslab+0x115/0x180 [ 816.303113] should_failslab+0x5/0x10 [ 816.306894] __kmalloc+0x2ab/0x3c0 [ 816.310423] ? kobject_get_path+0xbf/0x240 [ 816.314659] kobject_get_path+0xbf/0x240 [ 816.318721] kobject_uevent_env+0x25c/0x1480 [ 816.323120] lo_ioctl+0xff9/0x20e0 [ 816.326654] ? loop_set_status64+0x110/0x110 [ 816.331051] blkdev_ioctl+0x5cb/0x1a80 [ 816.334921] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 816.340272] ? blkpg_ioctl+0x9d0/0x9d0 [ 816.344153] ? mark_held_locks+0xf0/0xf0 [ 816.348195] ? mark_held_locks+0xf0/0xf0 [ 816.352243] ? debug_check_no_obj_freed+0x201/0x490 [ 816.357246] ? lock_downgrade+0x720/0x720 [ 816.361384] block_ioctl+0xe9/0x130 [ 816.364993] ? blkdev_fallocate+0x3f0/0x3f0 [ 816.369298] do_vfs_ioctl+0xcdb/0x12e0 [ 816.373172] ? lock_downgrade+0x720/0x720 [ 816.377302] ? check_preemption_disabled+0x41/0x280 [ 816.382300] ? ioctl_preallocate+0x200/0x200 [ 816.386692] ? __fget+0x356/0x510 [ 816.390133] ? do_dup2+0x450/0x450 [ 816.393663] ? do_sys_open+0x2bf/0x520 [ 816.397537] ksys_ioctl+0x9b/0xc0 [ 816.400975] __x64_sys_ioctl+0x6f/0xb0 [ 816.405282] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 816.409848] do_syscall_64+0xf9/0x620 [ 816.413639] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 816.418816] RIP: 0033:0x7ff4b2beae07 [ 816.422516] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 816.441401] RSP: 002b:00007ff4b155ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 816.449106] RAX: ffffffffffffffda RBX: 00007ff4b2c349c8 RCX: 00007ff4b2beae07 [ 816.456356] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 816.463780] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 816.471028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 816.478278] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 [ 816.490123] erofs: read_super, device -> /dev/loop5 07:26:32 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000080006000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) [ 816.498373] erofs: options -> noacl, [ 816.514598] erofs: read_super, device -> /dev/loop2 07:26:32 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040fdffffff000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 816.558638] erofs: root inode @ nid 0 [ 816.565140] erofs: bogus i_mode (0) @ nid 0 [ 816.578599] erofs: options -> noacl,user_xattr, [ 816.596537] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 07:26:32 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 816.606501] erofs: root inode @ nid 36 [ 816.617992] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:32 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 21) 07:26:32 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x100}], 0x0, &(0x7f0000000080)) [ 816.672774] erofs: read_super, device -> /dev/loop1 [ 816.681514] erofs: options -> noacl,user_xattr, [ 816.689173] erofs: root inode @ nid 36 [ 816.696839] erofs: unmounted for /dev/loop2 [ 816.697050] erofs: mounted on /dev/loop1 with opts: noacl. 07:26:32 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000020000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 816.764994] erofs: read_super, device -> /dev/loop5 [ 816.770039] erofs: options -> noacl, [ 816.780668] squashfs: SQUASHFS error: unable to read fragment index table 07:26:32 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{}]}) [ 816.835417] erofs: unmounted for /dev/loop1 [ 816.839685] FAULT_INJECTION: forcing a failure. [ 816.839685] name failslab, interval 1, probability 0, space 0, times 0 [ 816.859539] erofs: root inode @ nid 0 [ 816.863316] CPU: 0 PID: 29669 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 816.871246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 816.873244] erofs: bogus i_mode (0) @ nid 0 [ 816.880594] Call Trace: [ 816.880617] dump_stack+0x1fc/0x2ef [ 816.880638] should_fail.cold+0xa/0xf [ 816.880655] ? setup_fault_attr+0x200/0x200 [ 816.880674] ? lock_acquire+0x170/0x3c0 [ 816.903220] __should_failslab+0x115/0x180 [ 816.907444] should_failslab+0x5/0x10 [ 816.911235] kmem_cache_alloc_node+0x245/0x3b0 [ 816.915804] __alloc_skb+0x71/0x560 [ 816.919442] alloc_uevent_skb+0x7b/0x210 [ 816.923500] kobject_uevent_env+0xa90/0x1480 [ 816.927897] lo_ioctl+0xff9/0x20e0 [ 816.931436] ? loop_set_status64+0x110/0x110 [ 816.935860] blkdev_ioctl+0x5cb/0x1a80 [ 816.939741] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 816.945097] ? blkpg_ioctl+0x9d0/0x9d0 [ 816.948969] ? mark_held_locks+0xf0/0xf0 [ 816.953030] ? mark_held_locks+0xf0/0xf0 [ 816.957081] ? debug_check_no_obj_freed+0x201/0x490 [ 816.962088] ? lock_downgrade+0x720/0x720 [ 816.966233] block_ioctl+0xe9/0x130 [ 816.969854] ? blkdev_fallocate+0x3f0/0x3f0 [ 816.974168] do_vfs_ioctl+0xcdb/0x12e0 [ 816.978042] ? lock_downgrade+0x720/0x720 [ 816.982188] ? check_preemption_disabled+0x41/0x280 [ 816.987198] ? ioctl_preallocate+0x200/0x200 [ 816.991590] ? __fget+0x356/0x510 [ 816.995046] ? do_dup2+0x450/0x450 [ 816.998567] ? do_sys_open+0x2bf/0x520 [ 817.002440] ksys_ioctl+0x9b/0xc0 [ 817.005916] __x64_sys_ioctl+0x6f/0xb0 [ 817.009796] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 817.014362] do_syscall_64+0xf9/0x620 [ 817.018149] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 817.023337] RIP: 0033:0x7ff4b2beae07 [ 817.027033] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 817.045917] RSP: 002b:00007ff4b155ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 817.053617] RAX: ffffffffffffffda RBX: 00007ff4b2c349c8 RCX: 00007ff4b2beae07 [ 817.060891] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 817.068142] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 817.075394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 817.082648] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 [ 817.095615] erofs: read_super, device -> /dev/loop2 [ 817.100801] erofs: options -> noacl,user_xattr, [ 817.106294] erofs: root inode @ nid 36 [ 817.110824] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:32 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 22) 07:26:32 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:32 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000000000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:33 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000000004000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00", 0x100}], 0x0, &(0x7f0000000080)) [ 817.195492] squashfs: SQUASHFS error: unable to read xattr id index table [ 817.201652] erofs: unmounted for /dev/loop2 [ 817.355446] erofs: read_super, device -> /dev/loop1 [ 817.360865] erofs: options -> user_xattr, [ 817.367178] erofs: root inode @ nid 36 [ 817.382002] erofs: mounted on /dev/loop1 with opts: user_xattr. 07:26:33 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000030000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:33 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{}]}) [ 817.407796] erofs: read_super, device -> /dev/loop5 [ 817.414030] erofs: options -> noacl, [ 817.415905] squashfs: SQUASHFS error: unable to read fragment index table [ 817.418046] erofs: root inode @ nid 0 [ 817.430705] erofs: bogus i_mode (0) @ nid 0 [ 817.445165] erofs: unmounted for /dev/loop1 07:26:33 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:33 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2a03000000000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 817.563628] squashfs: SQUASHFS error: unable to read xattr id index table 07:26:33 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000000004000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00", 0x100}], 0x0, &(0x7f0000000080)) [ 817.622761] FAULT_INJECTION: forcing a failure. [ 817.622761] name failslab, interval 1, probability 0, space 0, times 0 [ 817.634799] CPU: 1 PID: 29705 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 817.642693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 817.652032] Call Trace: [ 817.654604] dump_stack+0x1fc/0x2ef [ 817.658225] should_fail.cold+0xa/0xf [ 817.662015] ? setup_fault_attr+0x200/0x200 [ 817.666320] ? lock_acquire+0x170/0x3c0 [ 817.670284] __should_failslab+0x115/0x180 [ 817.674505] should_failslab+0x5/0x10 [ 817.678290] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 817.683386] __kmalloc_node_track_caller+0x38/0x70 [ 817.688320] __alloc_skb+0xae/0x560 [ 817.691951] alloc_uevent_skb+0x7b/0x210 [ 817.696012] kobject_uevent_env+0xa90/0x1480 [ 817.700448] lo_ioctl+0xff9/0x20e0 [ 817.703997] ? loop_set_status64+0x110/0x110 [ 817.708407] blkdev_ioctl+0x5cb/0x1a80 [ 817.712288] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 817.717632] ? blkpg_ioctl+0x9d0/0x9d0 [ 817.721510] ? mark_held_locks+0xf0/0xf0 [ 817.725564] ? mark_held_locks+0xf0/0xf0 [ 817.729609] ? debug_check_no_obj_freed+0x201/0x490 [ 817.734613] ? lock_downgrade+0x720/0x720 [ 817.738775] block_ioctl+0xe9/0x130 [ 817.742391] ? blkdev_fallocate+0x3f0/0x3f0 [ 817.746697] do_vfs_ioctl+0xcdb/0x12e0 [ 817.750641] ? lock_downgrade+0x720/0x720 [ 817.754791] ? check_preemption_disabled+0x41/0x280 [ 817.759797] ? ioctl_preallocate+0x200/0x200 [ 817.764370] ? __fget+0x356/0x510 [ 817.767815] ? do_dup2+0x450/0x450 [ 817.771367] ? do_sys_open+0x2bf/0x520 [ 817.775253] ksys_ioctl+0x9b/0xc0 [ 817.778712] __x64_sys_ioctl+0x6f/0xb0 [ 817.782589] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 817.787161] do_syscall_64+0xf9/0x620 [ 817.790953] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 817.796124] RIP: 0033:0x7ff4b2beae07 [ 817.799821] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 817.818707] RSP: 002b:00007ff4b155ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 817.826404] RAX: ffffffffffffffda RBX: 00007ff4b2c349c8 RCX: 00007ff4b2beae07 [ 817.833656] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 817.840905] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 817.848155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 817.855406] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 07:26:33 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000040000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 817.904853] erofs: read_super, device -> /dev/loop1 [ 817.909907] erofs: options -> user_xattr, [ 817.916575] erofs: root inode @ nid 36 [ 817.926359] erofs: read_super, device -> /dev/loop2 [ 817.936045] squashfs: SQUASHFS error: unable to read fragment index table [ 817.945454] erofs: options -> noacl,user_xattr, 07:26:33 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 817.950630] erofs: mounted on /dev/loop1 with opts: user_xattr. [ 817.955635] erofs: root inode @ nid 36 [ 817.960923] erofs: mounted on /dev/loop2 with opts: noacl. [ 817.986389] erofs: read_super, device -> /dev/loop5 [ 817.996985] erofs: options -> noacl, [ 818.000985] erofs: root inode @ nid 0 07:26:33 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 23) 07:26:33 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{}]}) [ 818.014056] erofs: bogus i_mode (0) @ nid 0 [ 818.020311] erofs: unmounted for /dev/loop2 [ 818.038833] erofs: unmounted for /dev/loop1 [ 818.045396] squashfs: SQUASHFS error: unable to read xattr id index table 07:26:33 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000050000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 818.113186] squashfs: SQUASHFS error: unable to read fragment index table 07:26:33 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x180}], 0x0, &(0x7f0000000080)) 07:26:34 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 818.258608] FAULT_INJECTION: forcing a failure. [ 818.258608] name failslab, interval 1, probability 0, space 0, times 0 [ 818.279130] CPU: 1 PID: 29757 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 818.287030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 818.296389] Call Trace: [ 818.299105] dump_stack+0x1fc/0x2ef [ 818.302726] should_fail.cold+0xa/0xf [ 818.306534] ? setup_fault_attr+0x200/0x200 [ 818.310876] ? lock_acquire+0x170/0x3c0 [ 818.314857] __should_failslab+0x115/0x180 [ 818.319088] should_failslab+0x5/0x10 [ 818.322877] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 818.327972] __kmalloc_node_track_caller+0x38/0x70 [ 818.332897] __alloc_skb+0xae/0x560 [ 818.336523] alloc_uevent_skb+0x7b/0x210 [ 818.340581] kobject_uevent_env+0xa90/0x1480 [ 818.344979] lo_ioctl+0xff9/0x20e0 [ 818.348506] ? loop_set_status64+0x110/0x110 [ 818.352898] blkdev_ioctl+0x5cb/0x1a80 [ 818.356768] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 818.362122] ? blkpg_ioctl+0x9d0/0x9d0 [ 818.366005] ? mark_held_locks+0xf0/0xf0 [ 818.370052] ? mark_held_locks+0xf0/0xf0 [ 818.374097] ? debug_check_no_obj_freed+0x201/0x490 [ 818.379098] ? lock_downgrade+0x720/0x720 [ 818.383241] block_ioctl+0xe9/0x130 [ 818.386872] ? blkdev_fallocate+0x3f0/0x3f0 [ 818.391180] do_vfs_ioctl+0xcdb/0x12e0 [ 818.395060] ? lock_downgrade+0x720/0x720 [ 818.399190] ? check_preemption_disabled+0x41/0x280 [ 818.404193] ? ioctl_preallocate+0x200/0x200 [ 818.408602] ? __fget+0x356/0x510 [ 818.412051] ? do_dup2+0x450/0x450 [ 818.415580] ? do_sys_open+0x2bf/0x520 [ 818.419453] ksys_ioctl+0x9b/0xc0 [ 818.422905] __x64_sys_ioctl+0x6f/0xb0 [ 818.426786] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 818.431353] do_syscall_64+0xf9/0x620 [ 818.435143] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 818.440312] RIP: 0033:0x7ff4b2beae07 07:26:34 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 818.444007] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 818.462896] RSP: 002b:00007ff4b155ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 818.470586] RAX: ffffffffffffffda RBX: 00007ff4b2c349c8 RCX: 00007ff4b2beae07 [ 818.477852] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 818.485112] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 818.492372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 818.499628] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 07:26:34 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000060000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 818.562485] erofs: read_super, device -> /dev/loop2 [ 818.566936] erofs: read_super, device -> /dev/loop1 [ 818.567744] erofs: options -> noacl,user_xattr, [ 818.576676] erofs: options -> user_xattr, [ 818.582359] erofs: root inode @ nid 36 [ 818.586673] erofs: mounted on /dev/loop1 with opts: user_xattr. [ 818.594407] erofs: root inode @ nid 36 [ 818.599410] erofs: mounted on /dev/loop2 with opts: noacl. [ 818.603899] squashfs: SQUASHFS error: unable to read fragment index table 07:26:34 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 24) [ 818.612888] erofs: read_super, device -> /dev/loop5 [ 818.618688] squashfs: SQUASHFS error: unable to read xattr id index table [ 818.634771] erofs: options -> noacl, [ 818.642730] erofs: unmounted for /dev/loop2 [ 818.645811] erofs: root inode @ nid 0 [ 818.651029] erofs: unmounted for /dev/loop1 07:26:34 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 1) 07:26:34 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:34 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x180}], 0x0, &(0x7f0000000080)) [ 818.660098] erofs: bogus i_mode (0) @ nid 0 [ 818.793248] FAULT_INJECTION: forcing a failure. [ 818.793248] name failslab, interval 1, probability 0, space 0, times 0 [ 818.804859] CPU: 1 PID: 29792 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 818.812730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 818.822070] Call Trace: [ 818.824656] dump_stack+0x1fc/0x2ef [ 818.828276] should_fail.cold+0xa/0xf [ 818.832062] ? setup_fault_attr+0x200/0x200 [ 818.836372] ? lock_acquire+0x170/0x3c0 [ 818.840334] __should_failslab+0x115/0x180 [ 818.844574] should_failslab+0x5/0x10 [ 818.848360] __kmalloc+0x2ab/0x3c0 [ 818.851887] ? __se_sys_memfd_create+0xf8/0x440 [ 818.856551] __se_sys_memfd_create+0xf8/0x440 [ 818.861051] ? memfd_file_seals_ptr+0x150/0x150 [ 818.865712] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 818.871062] ? trace_hardirqs_off_caller+0x6e/0x210 [ 818.876061] ? do_syscall_64+0x21/0x620 [ 818.880024] do_syscall_64+0xf9/0x620 [ 818.883830] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 818.889003] RIP: 0033:0x7fd12fca4049 [ 818.892703] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 818.911597] RSP: 002b:00007fd12e618f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 818.919307] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca4049 [ 818.926569] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fd12fcfd1e0 [ 818.933832] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007fd12e6191d0 07:26:34 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 2) [ 818.941082] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 818.948334] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 [ 819.005674] FAULT_INJECTION: forcing a failure. [ 819.005674] name failslab, interval 1, probability 0, space 0, times 0 [ 819.018174] squashfs: SQUASHFS error: unable to read fragment index table [ 819.018313] FAULT_INJECTION: forcing a failure. [ 819.018313] name failslab, interval 1, probability 0, space 0, times 0 [ 819.033446] CPU: 0 PID: 29796 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 819.044439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 819.053782] Call Trace: [ 819.056365] dump_stack+0x1fc/0x2ef [ 819.060007] should_fail.cold+0xa/0xf [ 819.063806] ? setup_fault_attr+0x200/0x200 [ 819.068134] ? lock_acquire+0x170/0x3c0 [ 819.072111] __should_failslab+0x115/0x180 [ 819.076355] should_failslab+0x5/0x10 [ 819.080155] kmem_cache_alloc_trace+0x284/0x380 [ 819.084822] ? wait_for_completion_io+0x10/0x10 [ 819.089486] ? kobj_ns_initial+0x90/0x90 [ 819.093543] call_usermodehelper_setup+0x84/0x300 [ 819.098401] kobject_uevent_env+0xe83/0x1480 [ 819.102821] lo_ioctl+0xff9/0x20e0 [ 819.106365] ? loop_set_status64+0x110/0x110 [ 819.110778] blkdev_ioctl+0x5cb/0x1a80 [ 819.114664] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 819.120108] ? blkpg_ioctl+0x9d0/0x9d0 [ 819.123989] ? mark_held_locks+0xf0/0xf0 [ 819.128045] ? mark_held_locks+0xf0/0xf0 [ 819.132112] ? debug_check_no_obj_freed+0x201/0x490 [ 819.137129] ? lock_downgrade+0x720/0x720 [ 819.141281] block_ioctl+0xe9/0x130 [ 819.144907] ? blkdev_fallocate+0x3f0/0x3f0 [ 819.149224] do_vfs_ioctl+0xcdb/0x12e0 [ 819.153108] ? lock_downgrade+0x720/0x720 [ 819.157249] ? check_preemption_disabled+0x41/0x280 [ 819.162258] ? ioctl_preallocate+0x200/0x200 [ 819.166662] ? __fget+0x356/0x510 [ 819.170122] ? do_dup2+0x450/0x450 [ 819.173656] ? do_sys_open+0x2bf/0x520 [ 819.177720] ksys_ioctl+0x9b/0xc0 [ 819.181180] __x64_sys_ioctl+0x6f/0xb0 [ 819.185063] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 819.189643] do_syscall_64+0xf9/0x620 [ 819.193443] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 819.198628] RIP: 0033:0x7ff4b2beae07 [ 819.202338] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 819.221231] RSP: 002b:00007ff4b155ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 819.228934] RAX: ffffffffffffffda RBX: 00007ff4b2c349c8 RCX: 00007ff4b2beae07 [ 819.236193] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 819.243454] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 819.250718] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 819.257980] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 [ 819.265268] CPU: 1 PID: 29804 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 819.273160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 819.282516] Call Trace: [ 819.285112] dump_stack+0x1fc/0x2ef [ 819.288753] should_fail.cold+0xa/0xf [ 819.292564] ? setup_fault_attr+0x200/0x200 [ 819.296895] ? lock_acquire+0x170/0x3c0 [ 819.300883] __should_failslab+0x115/0x180 07:26:35 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000070000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 819.305124] should_failslab+0x5/0x10 [ 819.308933] kmem_cache_alloc+0x277/0x370 [ 819.313097] ? shmem_destroy_callback+0xb0/0xb0 [ 819.317776] shmem_alloc_inode+0x18/0x40 [ 819.321846] ? shmem_destroy_callback+0xb0/0xb0 [ 819.326523] alloc_inode+0x5d/0x180 [ 819.330155] new_inode+0x1d/0xf0 [ 819.333537] shmem_get_inode+0x96/0x8d0 [ 819.337512] __shmem_file_setup.part.0+0x7a/0x2b0 [ 819.342358] shmem_file_setup+0x61/0x90 [ 819.346330] __se_sys_memfd_create+0x26b/0x440 [ 819.350894] ? memfd_file_seals_ptr+0x150/0x150 [ 819.355559] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 819.360920] ? trace_hardirqs_off_caller+0x6e/0x210 [ 819.365919] ? do_syscall_64+0x21/0x620 [ 819.369888] do_syscall_64+0xf9/0x620 [ 819.373705] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 819.378877] RIP: 0033:0x7fd12fca4049 [ 819.382574] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:26:35 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 3) [ 819.401456] RSP: 002b:00007fd12e618f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 819.409152] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca4049 [ 819.416404] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fd12fcfd1e0 [ 819.423657] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007fd12e6191d0 [ 819.430908] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 819.438159] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 07:26:35 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6000000000000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:35 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 819.464721] erofs: read_super, device -> /dev/loop2 [ 819.472091] squashfs: SQUASHFS error: unable to read xattr id index table [ 819.474637] erofs: options -> noacl,user_xattr, [ 819.497737] erofs: root inode @ nid 36 [ 819.507502] erofs: mounted on /dev/loop2 with opts: noacl. [ 819.519344] FAULT_INJECTION: forcing a failure. [ 819.519344] name failslab, interval 1, probability 0, space 0, times 0 [ 819.531442] CPU: 0 PID: 29811 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 819.539330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 819.548680] Call Trace: [ 819.551278] dump_stack+0x1fc/0x2ef [ 819.554913] should_fail.cold+0xa/0xf [ 819.558723] ? setup_fault_attr+0x200/0x200 [ 819.563053] ? lock_acquire+0x170/0x3c0 [ 819.567038] __should_failslab+0x115/0x180 [ 819.571286] should_failslab+0x5/0x10 [ 819.575089] kmem_cache_alloc+0x277/0x370 [ 819.579243] __d_alloc+0x2b/0xa10 [ 819.582708] d_alloc_pseudo+0x19/0x70 [ 819.586516] alloc_file_pseudo+0xc6/0x250 [ 819.590672] ? alloc_file+0x4d0/0x4d0 [ 819.594472] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 819.600098] ? shmem_get_inode+0x44c/0x8d0 [ 819.604343] __shmem_file_setup.part.0+0x102/0x2b0 [ 819.609285] shmem_file_setup+0x61/0x90 [ 819.613269] __se_sys_memfd_create+0x26b/0x440 07:26:35 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 25) 07:26:35 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x180}], 0x0, &(0x7f0000000080)) [ 819.617860] ? memfd_file_seals_ptr+0x150/0x150 [ 819.619913] squashfs: SQUASHFS error: unable to read xattr id index table [ 819.622534] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 819.622553] ? trace_hardirqs_off_caller+0x6e/0x210 [ 819.622569] ? do_syscall_64+0x21/0x620 [ 819.622585] do_syscall_64+0xf9/0x620 [ 819.622602] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 819.622614] RIP: 0033:0x7fd12fca4049 [ 819.622627] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 819.622635] RSP: 002b:00007fd12e618f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 819.622647] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca4049 [ 819.622655] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fd12fcfd1e0 [ 819.622662] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007fd12e6191d0 [ 819.622669] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 819.622682] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 07:26:35 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 4) [ 819.719583] erofs: unmounted for /dev/loop2 [ 819.735217] erofs: read_super, device -> /dev/loop5 [ 819.740253] erofs: options -> noacl, [ 819.746477] erofs: root inode @ nid 0 [ 819.750483] erofs: bogus i_mode (0) @ nid 0 07:26:35 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1c0}], 0x0, &(0x7f0000000080)) [ 819.812561] FAULT_INJECTION: forcing a failure. [ 819.812561] name failslab, interval 1, probability 0, space 0, times 0 [ 819.824343] CPU: 1 PID: 29834 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 819.832239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 819.841589] Call Trace: [ 819.844165] dump_stack+0x1fc/0x2ef [ 819.847869] should_fail.cold+0xa/0xf [ 819.851662] ? setup_fault_attr+0x200/0x200 [ 819.855986] ? lock_acquire+0x170/0x3c0 [ 819.859947] __should_failslab+0x115/0x180 [ 819.864166] should_failslab+0x5/0x10 [ 819.868038] kmem_cache_alloc+0x277/0x370 [ 819.872173] __alloc_file+0x21/0x340 [ 819.875869] alloc_empty_file+0x6d/0x170 [ 819.879910] alloc_file+0x5e/0x4d0 [ 819.883436] alloc_file_pseudo+0x165/0x250 [ 819.887652] ? alloc_file+0x4d0/0x4d0 [ 819.891434] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 819.897037] ? shmem_get_inode+0x44c/0x8d0 [ 819.901255] __shmem_file_setup.part.0+0x102/0x2b0 [ 819.906169] shmem_file_setup+0x61/0x90 [ 819.910127] __se_sys_memfd_create+0x26b/0x440 [ 819.914699] ? memfd_file_seals_ptr+0x150/0x150 [ 819.919350] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 819.924696] ? trace_hardirqs_off_caller+0x6e/0x210 [ 819.929700] ? do_syscall_64+0x21/0x620 [ 819.933677] do_syscall_64+0xf9/0x620 [ 819.937478] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 819.942658] RIP: 0033:0x7fd12fca4049 07:26:35 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 5) [ 819.946360] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 819.965254] RSP: 002b:00007fd12e618f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 819.972944] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca4049 [ 819.980194] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fd12fcfd1e0 [ 819.987456] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007fd12e6191d0 [ 819.994705] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 820.001952] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 [ 820.046889] squashfs: SQUASHFS error: unable to read fragment index table 07:26:35 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000080000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 820.118017] FAULT_INJECTION: forcing a failure. [ 820.118017] name failslab, interval 1, probability 0, space 0, times 0 [ 820.138119] squashfs: SQUASHFS error: unable to read xattr id index table [ 820.156306] FAULT_INJECTION: forcing a failure. [ 820.156306] name failslab, interval 1, probability 0, space 0, times 0 [ 820.164529] CPU: 1 PID: 29841 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 820.175395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 820.184746] Call Trace: [ 820.187331] dump_stack+0x1fc/0x2ef [ 820.190951] should_fail.cold+0xa/0xf [ 820.194745] ? setup_fault_attr+0x200/0x200 [ 820.199056] ? lock_acquire+0x170/0x3c0 [ 820.203029] __should_failslab+0x115/0x180 [ 820.207258] should_failslab+0x5/0x10 [ 820.211049] kmem_cache_alloc+0x277/0x370 [ 820.215188] getname_flags+0xce/0x590 [ 820.218980] do_mkdirat+0x8d/0x2d0 [ 820.222514] ? __ia32_sys_mknod+0x120/0x120 [ 820.226826] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 820.232185] ? trace_hardirqs_off_caller+0x6e/0x210 [ 820.237191] ? do_syscall_64+0x21/0x620 [ 820.241158] do_syscall_64+0xf9/0x620 [ 820.244955] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 820.250132] RIP: 0033:0x7ff4b2bea157 07:26:35 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:35 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 820.253836] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 820.272729] RSP: 002b:00007ff4b155ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 820.280423] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007ff4b2bea157 [ 820.287690] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 820.294958] RBP: 00007ff4b1560020 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 820.302215] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 820.309476] R13: 0000000020000100 R14: 00007ff4b155ffe0 R15: 0000000020000140 [ 820.316758] CPU: 0 PID: 29850 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 820.324703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 820.334051] Call Trace: [ 820.336654] dump_stack+0x1fc/0x2ef [ 820.340293] should_fail.cold+0xa/0xf [ 820.344102] ? setup_fault_attr+0x200/0x200 [ 820.348425] ? lock_acquire+0x170/0x3c0 [ 820.352388] __should_failslab+0x115/0x180 [ 820.356633] should_failslab+0x5/0x10 [ 820.360417] kmem_cache_alloc_trace+0x284/0x380 [ 820.365073] apparmor_file_alloc_security+0x394/0xad0 [ 820.370256] ? apparmor_file_receive+0x160/0x160 [ 820.375002] ? __alloc_file+0x21/0x340 [ 820.378893] security_file_alloc+0x40/0x90 [ 820.383113] __alloc_file+0xd8/0x340 [ 820.386809] alloc_empty_file+0x6d/0x170 [ 820.390866] alloc_file+0x5e/0x4d0 [ 820.394400] alloc_file_pseudo+0x165/0x250 [ 820.398619] ? alloc_file+0x4d0/0x4d0 [ 820.402399] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 820.408013] ? shmem_get_inode+0x44c/0x8d0 [ 820.412230] __shmem_file_setup.part.0+0x102/0x2b0 [ 820.417145] shmem_file_setup+0x61/0x90 [ 820.421099] __se_sys_memfd_create+0x26b/0x440 [ 820.425668] ? memfd_file_seals_ptr+0x150/0x150 [ 820.430333] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 820.435687] ? trace_hardirqs_off_caller+0x6e/0x210 [ 820.440687] ? do_syscall_64+0x21/0x620 [ 820.444653] do_syscall_64+0xf9/0x620 [ 820.448439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 820.453616] RIP: 0033:0x7fd12fca4049 [ 820.457323] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 820.476205] RSP: 002b:00007fd12e618f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 820.483892] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca4049 [ 820.491144] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fd12fcfd1e0 [ 820.498400] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007fd12e6191d0 [ 820.505654] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 07:26:36 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 6) [ 820.512924] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000140 07:26:36 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000000004000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000", 0x1c0}], 0x0, &(0x7f0000000080)) 07:26:36 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 26) [ 820.606506] squashfs: SQUASHFS error: unable to read fragment index table [ 820.619706] FAULT_INJECTION: forcing a failure. [ 820.619706] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 820.632827] CPU: 1 PID: 29871 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 820.640719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 820.650071] Call Trace: [ 820.652651] dump_stack+0x1fc/0x2ef [ 820.656269] should_fail.cold+0xa/0xf [ 820.660060] ? lock_acquire+0x170/0x3c0 [ 820.664036] ? setup_fault_attr+0x200/0x200 [ 820.668354] __alloc_pages_nodemask+0x239/0x2890 [ 820.673094] ? __lock_acquire+0x6de/0x3ff0 [ 820.677318] ? static_obj+0x50/0x50 [ 820.680940] ? __lock_acquire+0x6de/0x3ff0 [ 820.685158] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 820.689989] ? __lock_acquire+0x6de/0x3ff0 [ 820.694215] ? mark_held_locks+0xf0/0xf0 [ 820.698263] ? unwind_next_frame+0xeee/0x1400 [ 820.702742] ? mark_held_locks+0xf0/0xf0 [ 820.706787] ? deref_stack_reg+0x134/0x1d0 [ 820.711004] ? get_reg+0x176/0x1f0 [ 820.714532] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 820.720404] alloc_pages_vma+0xf2/0x780 [ 820.724366] shmem_alloc_page+0x11c/0x1f0 [ 820.728498] ? shmem_swapin+0x220/0x220 [ 820.732475] ? percpu_counter_add_batch+0x126/0x180 [ 820.737479] ? __vm_enough_memory+0x316/0x650 [ 820.741962] shmem_alloc_and_acct_page+0x15a/0x850 [ 820.746884] shmem_getpage_gfp+0x4e9/0x37f0 [ 820.751204] ? shmem_alloc_and_acct_page+0x850/0x850 [ 820.756293] ? mark_held_locks+0xa6/0xf0 [ 820.760339] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 820.765515] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 820.770693] shmem_write_begin+0xff/0x1e0 [ 820.774838] generic_perform_write+0x1f8/0x4d0 [ 820.779411] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 820.784063] ? current_time+0x1c0/0x1c0 [ 820.788025] ? lock_acquire+0x170/0x3c0 [ 820.791993] __generic_file_write_iter+0x24b/0x610 [ 820.796910] generic_file_write_iter+0x3f8/0x730 [ 820.801659] __vfs_write+0x51b/0x770 [ 820.805359] ? kernel_read+0x110/0x110 [ 820.809243] ? check_preemption_disabled+0x41/0x280 [ 820.814253] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 820.819257] vfs_write+0x1f3/0x540 [ 820.822786] __x64_sys_pwrite64+0x1f7/0x250 [ 820.827094] ? ksys_pwrite64+0x1a0/0x1a0 [ 820.831145] ? trace_hardirqs_off_caller+0x6e/0x210 [ 820.836144] ? do_syscall_64+0x21/0x620 [ 820.840110] do_syscall_64+0xf9/0x620 [ 820.843900] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 820.849072] RIP: 0033:0x7fd12fc57017 [ 820.852771] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 820.871656] RSP: 002b:00007fd12e618f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 820.879349] RAX: ffffffffffffffda RBX: 00007fd12fced9c8 RCX: 00007fd12fc57017 [ 820.886605] RDX: 000000000000000f RSI: 0000000020010000 RDI: 0000000000000004 [ 820.893859] RBP: 0000000000000003 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 820.901112] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 820.908368] R13: 0000000000000004 R14: 0000000020000180 R15: 0000000000000000 [ 820.919916] erofs: read_super, device -> /dev/loop5 [ 820.925798] erofs: options -> noacl, [ 820.934077] erofs: root inode @ nid 0 [ 820.942578] erofs: bogus i_mode (0) @ nid 0 07:26:36 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000090000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:36 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 820.984701] FAULT_INJECTION: forcing a failure. [ 820.984701] name failslab, interval 1, probability 0, space 0, times 0 [ 820.998582] erofs: read_super, device -> /dev/loop1 [ 821.012187] squashfs: SQUASHFS error: unable to read xattr id index table [ 821.024856] erofs: options -> noacl,user_xattr, [ 821.034502] CPU: 1 PID: 29874 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 821.042393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.051755] Call Trace: [ 821.054351] dump_stack+0x1fc/0x2ef [ 821.057992] should_fail.cold+0xa/0xf [ 821.061792] ? setup_fault_attr+0x200/0x200 [ 821.066097] ? lock_acquire+0x170/0x3c0 [ 821.070068] __should_failslab+0x115/0x180 [ 821.074303] should_failslab+0x5/0x10 [ 821.078088] kmem_cache_alloc+0x277/0x370 [ 821.082220] getname_flags+0xce/0x590 [ 821.086001] do_mkdirat+0x8d/0x2d0 [ 821.089524] ? __ia32_sys_mknod+0x120/0x120 [ 821.093828] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 821.099175] ? trace_hardirqs_off_caller+0x6e/0x210 [ 821.104173] ? do_syscall_64+0x21/0x620 [ 821.108127] do_syscall_64+0xf9/0x620 [ 821.111915] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 821.117087] RIP: 0033:0x7ff4b2bea157 07:26:36 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040000000007a0006000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) [ 821.120796] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 821.139683] RSP: 002b:00007ff4b155ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 821.147374] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007ff4b2bea157 [ 821.154643] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 821.161892] RBP: 00007ff4b1560020 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 821.169141] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 821.176389] R13: 0000000020000100 R14: 00007ff4b155ffe0 R15: 0000000020000140 [ 821.187174] erofs: cannot find valid erofs superblock 07:26:36 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1c0}], 0x0, &(0x7f0000000080)) [ 821.248425] squashfs: SQUASHFS error: unable to read fragment index table 07:26:37 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 7) 07:26:37 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 27) 07:26:37 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 821.394684] erofs: read_super, device -> /dev/loop5 [ 821.402898] squashfs: SQUASHFS error: unable to read xattr id index table [ 821.415978] erofs: options -> noacl, [ 821.427367] erofs: root inode @ nid 0 [ 821.432954] erofs: bogus i_mode (0) @ nid 0 [ 821.469937] FAULT_INJECTION: forcing a failure. [ 821.469937] name failslab, interval 1, probability 0, space 0, times 0 [ 821.481671] CPU: 1 PID: 29910 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 821.489572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.498200] FAULT_INJECTION: forcing a failure. [ 821.498200] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 821.498928] Call Trace: [ 821.513288] dump_stack+0x1fc/0x2ef [ 821.516915] should_fail.cold+0xa/0xf [ 821.520711] ? setup_fault_attr+0x200/0x200 [ 821.525023] ? lock_acquire+0x170/0x3c0 [ 821.528990] __should_failslab+0x115/0x180 [ 821.533214] should_failslab+0x5/0x10 [ 821.537000] kmem_cache_alloc+0x277/0x370 [ 821.541140] getname_flags+0xce/0x590 [ 821.544934] do_sys_open+0x26c/0x520 [ 821.548637] ? filp_open+0x70/0x70 [ 821.552173] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 821.557525] ? trace_hardirqs_off_caller+0x6e/0x210 [ 821.562531] ? do_syscall_64+0x21/0x620 [ 821.566523] do_syscall_64+0xf9/0x620 [ 821.570314] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 821.575492] RIP: 0033:0x7fd12fc56f64 [ 821.579193] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 821.598083] RSP: 002b:00007fd12e618eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 821.605774] RAX: ffffffffffffffda RBX: 00007fd12fced9c8 RCX: 00007fd12fc56f64 [ 821.613027] RDX: 0000000000000002 RSI: 00007fd12e618fe0 RDI: 00000000ffffff9c [ 821.620282] RBP: 00007fd12e618fe0 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 821.627539] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 821.634793] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 [ 821.642066] CPU: 0 PID: 29911 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 821.649946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.659295] Call Trace: [ 821.661887] dump_stack+0x1fc/0x2ef [ 821.665524] should_fail.cold+0xa/0xf 07:26:37 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 8) [ 821.669339] ? setup_fault_attr+0x200/0x200 [ 821.673665] ? wake_up_q+0x93/0xe0 [ 821.677212] ? __mutex_unlock_slowpath+0x2be/0x610 [ 821.682160] __alloc_pages_nodemask+0x239/0x2890 [ 821.686925] ? __lock_acquire+0x6de/0x3ff0 [ 821.691171] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 821.696007] ? blkdev_ioctl+0x11a/0x1a80 [ 821.700050] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 821.705405] ? blkpg_ioctl+0x9d0/0x9d0 [ 821.709279] ? debug_check_no_obj_freed+0x201/0x490 [ 821.714287] ? lock_downgrade+0x720/0x720 [ 821.718418] cache_grow_begin+0xa4/0x8a0 [ 821.722465] ? setup_fault_attr+0x200/0x200 [ 821.726776] ? lock_acquire+0x170/0x3c0 [ 821.730747] cache_alloc_refill+0x273/0x340 [ 821.735060] kmem_cache_alloc+0x346/0x370 [ 821.739190] getname_flags+0xce/0x590 [ 821.742987] do_mkdirat+0x8d/0x2d0 [ 821.746517] ? __ia32_sys_mknod+0x120/0x120 [ 821.750823] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 821.756182] ? trace_hardirqs_off_caller+0x6e/0x210 [ 821.761190] ? do_syscall_64+0x21/0x620 [ 821.765155] do_syscall_64+0xf9/0x620 [ 821.768938] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 821.774110] RIP: 0033:0x7ff4b2bea157 [ 821.777805] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 821.796783] RSP: 002b:00007ff4b155ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 821.804470] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007ff4b2bea157 [ 821.811759] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 07:26:37 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffff1f0000000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:37 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040000a0000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 821.819011] RBP: 00007ff4b1560020 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 821.826271] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 821.833530] R13: 0000000020000100 R14: 00007ff4b155ffe0 R15: 0000000020000140 07:26:37 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000000004000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d00", 0x1e0}], 0x0, &(0x7f0000000080)) 07:26:37 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 28) [ 821.863166] erofs: read_super, device -> /dev/loop2 [ 821.868211] erofs: options -> noacl,user_xattr, [ 821.873553] erofs: root inode @ nid 36 [ 821.877691] erofs: mounted on /dev/loop2 with opts: noacl. [ 821.889137] squashfs: SQUASHFS error: unable to read fragment index table [ 821.920795] FAULT_INJECTION: forcing a failure. [ 821.920795] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 821.920843] erofs: unmounted for /dev/loop2 [ 821.932616] CPU: 0 PID: 29928 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 821.932626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.932630] Call Trace: [ 821.932651] dump_stack+0x1fc/0x2ef [ 821.932672] should_fail.cold+0xa/0xf [ 821.932689] ? setup_fault_attr+0x200/0x200 [ 821.932706] ? do_writepages+0x290/0x290 [ 821.932721] ? unlock_page+0x13d/0x230 [ 821.932742] __alloc_pages_nodemask+0x239/0x2890 [ 821.932760] ? lock_downgrade+0x720/0x720 [ 821.932776] ? check_preemption_disabled+0x41/0x280 [ 821.932792] ? __lock_acquire+0x6de/0x3ff0 [ 821.932809] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 821.932822] ? lock_downgrade+0x720/0x720 [ 821.932834] ? lock_acquire+0x170/0x3c0 [ 821.932855] ? up_write+0x18/0x150 [ 821.932867] ? generic_file_write_iter+0x381/0x730 [ 821.932879] ? iov_iter_init+0xb8/0x1d0 [ 821.932898] cache_grow_begin+0xa4/0x8a0 [ 821.932912] ? setup_fault_attr+0x200/0x200 [ 821.932926] ? lock_acquire+0x170/0x3c0 [ 821.932943] cache_alloc_refill+0x273/0x340 [ 821.932963] kmem_cache_alloc+0x346/0x370 [ 822.040610] getname_flags+0xce/0x590 [ 822.044414] do_sys_open+0x26c/0x520 [ 822.048114] ? filp_open+0x70/0x70 [ 822.051643] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 822.057079] ? trace_hardirqs_off_caller+0x6e/0x210 [ 822.062083] ? do_syscall_64+0x21/0x620 [ 822.066046] do_syscall_64+0xf9/0x620 [ 822.069836] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 822.075024] RIP: 0033:0x7fd12fc56f64 [ 822.078734] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 822.097623] RSP: 002b:00007fd12e618eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 822.105318] RAX: ffffffffffffffda RBX: 00007fd12fced9c8 RCX: 00007fd12fc56f64 [ 822.112573] RDX: 0000000000000002 RSI: 00007fd12e618fe0 RDI: 00000000ffffff9c [ 822.119824] RBP: 00007fd12e618fe0 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 822.127085] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 822.134336] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 07:26:37 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000100000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:38 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 822.232195] erofs: read_super, device -> /dev/loop5 [ 822.235047] squashfs: SQUASHFS error: unable to read xattr id index table [ 822.237423] erofs: options -> noacl, [ 822.250562] erofs: root inode @ nid 0 [ 822.258404] erofs: bogus i_mode (0) @ nid 0 [ 822.302842] erofs: read_super, device -> /dev/loop1 [ 822.307880] erofs: options -> noacl,user_xattr, [ 822.314303] erofs: root inode @ nid 36 [ 822.318347] erofs: mounted on /dev/loop1 with opts: noacl. 07:26:38 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffff7f00000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:38 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1e0}], 0x0, &(0x7f0000000080)) 07:26:38 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 9) [ 822.361604] FAULT_INJECTION: forcing a failure. [ 822.361604] name failslab, interval 1, probability 0, space 0, times 0 [ 822.386658] squashfs: SQUASHFS error: unable to read fragment index table [ 822.395882] erofs: unmounted for /dev/loop1 [ 822.403858] CPU: 0 PID: 29945 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 822.411754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 822.421105] Call Trace: [ 822.423698] dump_stack+0x1fc/0x2ef [ 822.427318] should_fail.cold+0xa/0xf [ 822.431109] ? setup_fault_attr+0x200/0x200 [ 822.435445] ? __lock_acquire+0x6de/0x3ff0 [ 822.439665] __should_failslab+0x115/0x180 [ 822.443894] should_failslab+0x5/0x10 [ 822.447682] __kmalloc+0x2ab/0x3c0 [ 822.451209] ? ext4_find_extent+0x9bb/0xc70 [ 822.455533] ext4_find_extent+0x9bb/0xc70 [ 822.459681] ext4_ext_map_blocks+0x1c0/0x7390 [ 822.464173] ? __lock_acquire+0x6de/0x3ff0 [ 822.468399] ? __lock_acquire+0x6de/0x3ff0 [ 822.472619] ? mark_held_locks+0xf0/0xf0 [ 822.476659] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 822.482022] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 822.487218] ? mark_held_locks+0xf0/0xf0 [ 822.491273] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 822.496107] ? ext4_es_lookup_extent+0x375/0xb60 [ 822.500846] ? lock_downgrade+0x720/0x720 [ 822.504981] ? lock_acquire+0x170/0x3c0 [ 822.508945] ? check_preemption_disabled+0x41/0x280 [ 822.513947] ? lock_acquire+0x170/0x3c0 [ 822.517908] ? ext4_map_blocks+0x33e/0x1a50 [ 822.522233] ext4_map_blocks+0xd88/0x1a50 [ 822.526383] ? check_preemption_disabled+0x41/0x280 [ 822.531397] ? ext4_issue_zeroout+0x160/0x160 [ 822.535891] ? __brelse+0x84/0xa0 [ 822.539321] ? __ext4_new_inode+0x2eb/0x5a20 [ 822.543726] ext4_getblk+0xad/0x4f0 [ 822.547355] ? ext4_iomap_begin+0xe00/0xe00 [ 822.551677] ? ext4_free_inode+0x1780/0x1780 [ 822.556079] ? debug_check_no_obj_freed+0x201/0x490 [ 822.561086] ? __dquot_initialize+0x298/0xb70 [ 822.565585] ext4_bread+0x7c/0x210 [ 822.569115] ? ext4_getblk+0x4f0/0x4f0 [ 822.572982] ? dquot_initialize_needed+0x290/0x290 [ 822.577891] ? trace_hardirqs_off+0x64/0x200 [ 822.582297] ext4_append+0x155/0x370 [ 822.586005] ext4_mkdir+0x5bd/0xe10 [ 822.589614] ? ext4_init_dot_dotdot+0x600/0x600 [ 822.594264] ? generic_permission+0x116/0x4d0 [ 822.598740] ? inode_permission.part.0+0x10c/0x450 [ 822.603665] vfs_mkdir+0x508/0x7a0 [ 822.607197] do_mkdirat+0x262/0x2d0 [ 822.610819] ? __ia32_sys_mknod+0x120/0x120 [ 822.615127] ? trace_hardirqs_off_caller+0x6e/0x210 [ 822.620122] ? do_syscall_64+0x21/0x620 [ 822.624092] do_syscall_64+0xf9/0x620 [ 822.627883] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 822.633066] RIP: 0033:0x7ff4b2bea157 [ 822.636761] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:26:38 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000230000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 822.655651] RSP: 002b:00007ff4b155ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 822.663349] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007ff4b2bea157 [ 822.670610] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 822.677858] RBP: 00007ff4b1560020 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 822.685114] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 822.692371] R13: 0000000020000100 R14: 00007ff4b155ffe0 R15: 0000000020000140 07:26:38 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 822.786458] erofs: read_super, device -> /dev/loop2 [ 822.791660] erofs: options -> noacl,user_xattr, [ 822.801296] erofs: read_super, device -> /dev/loop5 [ 822.811377] erofs: root inode @ nid 36 [ 822.811831] squashfs: SQUASHFS error: unable to read xattr id index table [ 822.815476] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:38 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 29) [ 822.834737] erofs: options -> noacl, [ 822.856977] erofs: root inode @ nid 0 [ 822.861159] erofs: unmounted for /dev/loop2 [ 822.867402] FAULT_INJECTION: forcing a failure. [ 822.867402] name failslab, interval 1, probability 0, space 0, times 0 [ 822.869993] erofs: bogus i_mode (0) @ nid 0 [ 822.894422] CPU: 1 PID: 29975 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 822.902317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 822.911656] Call Trace: [ 822.914233] dump_stack+0x1fc/0x2ef [ 822.917843] should_fail.cold+0xa/0xf [ 822.921627] ? setup_fault_attr+0x200/0x200 [ 822.925939] ? lock_acquire+0x170/0x3c0 [ 822.929898] __should_failslab+0x115/0x180 [ 822.934117] should_failslab+0x5/0x10 [ 822.937896] kmem_cache_alloc+0x277/0x370 [ 822.942037] __alloc_file+0x21/0x340 [ 822.945742] alloc_empty_file+0x6d/0x170 [ 822.949786] path_openat+0xe9/0x2df0 [ 822.953481] ? __lock_acquire+0x6de/0x3ff0 [ 822.957703] ? path_lookupat+0x8d0/0x8d0 [ 822.961747] ? mark_held_locks+0xf0/0xf0 [ 822.965796] do_filp_open+0x18c/0x3f0 [ 822.969592] ? may_open_dev+0xf0/0xf0 [ 822.973376] ? __alloc_fd+0x28d/0x570 [ 822.977160] ? lock_downgrade+0x720/0x720 [ 822.981288] ? lock_acquire+0x170/0x3c0 [ 822.985239] ? __alloc_fd+0x34/0x570 [ 822.988941] ? do_raw_spin_unlock+0x171/0x230 [ 822.993420] ? _raw_spin_unlock+0x29/0x40 [ 822.997545] ? __alloc_fd+0x28d/0x570 [ 823.001331] do_sys_open+0x3b3/0x520 [ 823.005028] ? filp_open+0x70/0x70 [ 823.008551] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 823.013918] ? trace_hardirqs_off_caller+0x6e/0x210 [ 823.018920] ? do_syscall_64+0x21/0x620 [ 823.022880] do_syscall_64+0xf9/0x620 [ 823.026665] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 823.031849] RIP: 0033:0x7fd12fc56f64 [ 823.035544] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 07:26:38 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 10) [ 823.054474] RSP: 002b:00007fd12e618eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 823.062178] RAX: ffffffffffffffda RBX: 00007fd12fced9c8 RCX: 00007fd12fc56f64 [ 823.069438] RDX: 0000000000000002 RSI: 00007fd12e618fe0 RDI: 00000000ffffff9c [ 823.076688] RBP: 00007fd12e618fe0 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 823.083940] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 823.091202] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 07:26:38 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:38 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1e0}], 0x0, &(0x7f0000000080)) 07:26:38 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000480000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 823.159786] squashfs: SQUASHFS error: unable to read fragment index table [ 823.245521] FAULT_INJECTION: forcing a failure. [ 823.245521] name failslab, interval 1, probability 0, space 0, times 0 [ 823.246107] FAULT_INJECTION: forcing a failure. [ 823.246107] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 823.268536] CPU: 1 PID: 29988 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 823.276417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.285772] Call Trace: [ 823.288468] dump_stack+0x1fc/0x2ef [ 823.292113] should_fail.cold+0xa/0xf [ 823.295925] ? setup_fault_attr+0x200/0x200 [ 823.300265] __alloc_pages_nodemask+0x239/0x2890 [ 823.305043] ? __lock_acquire+0x6de/0x3ff0 [ 823.309293] ? get_reg+0x1f0/0x1f0 [ 823.312848] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 823.317794] ? mark_held_locks+0xf0/0xf0 [ 823.321868] ? unwind_next_frame+0xeee/0x1400 [ 823.326377] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 823.332272] ? deref_stack_reg+0x1d0/0x1d0 [ 823.336516] ? __find_get_block+0x9d6/0xde0 [ 823.340849] ? is_bpf_text_address+0xd5/0x1b0 [ 823.345362] cache_grow_begin+0xa4/0x8a0 [ 823.349433] ? setup_fault_attr+0x200/0x200 [ 823.353767] cache_alloc_refill+0x273/0x340 [ 823.358106] kmem_cache_alloc+0x346/0x370 [ 823.362260] ? ext4_sync_fs+0x8d0/0x8d0 [ 823.366242] ext4_alloc_inode+0x1a/0x630 [ 823.370314] ? ext4_sync_fs+0x8d0/0x8d0 [ 823.374286] alloc_inode+0x5d/0x180 [ 823.377910] new_inode+0x1d/0xf0 [ 823.381279] __ext4_new_inode+0x400/0x5a20 [ 823.385528] ? putname+0xe1/0x120 [ 823.388992] ? do_mkdirat+0xa0/0x2d0 [ 823.392715] ? ext4_free_inode+0x1780/0x1780 [ 823.397121] ? debug_check_no_obj_freed+0x201/0x490 [ 823.402133] ? __dquot_initialize+0x298/0xb70 [ 823.406639] ? lock_acquire+0x170/0x3c0 [ 823.410622] ? dquot_initialize_needed+0x290/0x290 [ 823.415565] ? trace_hardirqs_off+0x64/0x200 [ 823.419979] ? common_perm+0x4be/0x800 [ 823.423871] ext4_mkdir+0x396/0xe10 [ 823.427504] ? putname+0xe1/0x120 [ 823.430964] ? ext4_init_dot_dotdot+0x600/0x600 [ 823.435643] ? generic_permission+0x116/0x4d0 [ 823.440138] ? security_inode_permission+0xc5/0xf0 [ 823.445072] ? inode_permission.part.0+0x10c/0x450 [ 823.450011] vfs_mkdir+0x508/0x7a0 [ 823.453557] do_mkdirat+0x262/0x2d0 [ 823.457187] ? __ia32_sys_mknod+0x120/0x120 [ 823.461514] ? trace_hardirqs_off_caller+0x6e/0x210 [ 823.466532] ? do_syscall_64+0x21/0x620 [ 823.470516] do_syscall_64+0xf9/0x620 [ 823.474329] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 823.479519] RIP: 0033:0x7ff4b2bea157 07:26:39 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 823.483239] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 823.502145] RSP: 002b:00007ff4b155ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 823.509859] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007ff4b2bea157 [ 823.517125] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 823.524395] RBP: 00007ff4b1560020 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 823.531661] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 823.538921] R13: 0000000020000100 R14: 00007ff4b155ffe0 R15: 0000000020000140 [ 823.563117] CPU: 0 PID: 29992 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 823.571021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.580370] Call Trace: [ 823.582964] dump_stack+0x1fc/0x2ef [ 823.586596] should_fail.cold+0xa/0xf [ 823.590407] ? setup_fault_attr+0x200/0x200 [ 823.594734] ? lock_acquire+0x170/0x3c0 [ 823.598722] __should_failslab+0x115/0x180 [ 823.602963] should_failslab+0x5/0x10 [ 823.606768] kmem_cache_alloc_trace+0x284/0x380 [ 823.611451] apparmor_file_alloc_security+0x394/0xad0 [ 823.616644] ? apparmor_file_receive+0x160/0x160 [ 823.621403] ? __alloc_file+0x21/0x340 [ 823.625303] security_file_alloc+0x40/0x90 [ 823.629543] __alloc_file+0xd8/0x340 [ 823.633259] alloc_empty_file+0x6d/0x170 [ 823.637329] path_openat+0xe9/0x2df0 [ 823.641043] ? __lock_acquire+0x6de/0x3ff0 [ 823.645296] ? path_lookupat+0x8d0/0x8d0 [ 823.649365] ? mark_held_locks+0xf0/0xf0 [ 823.653438] do_filp_open+0x18c/0x3f0 [ 823.657236] ? may_open_dev+0xf0/0xf0 [ 823.661044] ? __alloc_fd+0x28d/0x570 [ 823.664852] ? lock_downgrade+0x720/0x720 [ 823.669008] ? lock_acquire+0x170/0x3c0 [ 823.672984] ? __alloc_fd+0x34/0x570 [ 823.676702] ? do_raw_spin_unlock+0x171/0x230 [ 823.681204] ? _raw_spin_unlock+0x29/0x40 [ 823.685353] ? __alloc_fd+0x28d/0x570 [ 823.689168] do_sys_open+0x3b3/0x520 [ 823.692887] ? filp_open+0x70/0x70 [ 823.696434] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 823.701801] ? trace_hardirqs_off_caller+0x6e/0x210 [ 823.706818] ? do_syscall_64+0x21/0x620 [ 823.710802] do_syscall_64+0xf9/0x620 [ 823.714608] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 823.719795] RIP: 0033:0x7fd12fc56f64 [ 823.723508] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 823.742406] RSP: 002b:00007fd12e618eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 823.750120] RAX: ffffffffffffffda RBX: 00007fd12fced9c8 RCX: 00007fd12fc56f64 [ 823.757392] RDX: 0000000000000002 RSI: 00007fd12e618fe0 RDI: 00000000ffffff9c [ 823.762408] erofs: read_super, device -> /dev/loop2 [ 823.764665] RBP: 00007fd12e618fe0 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 823.769665] erofs: options -> noacl,user_xattr, [ 823.776918] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 823.776926] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 [ 823.805849] erofs: read_super, device -> /dev/loop5 [ 823.810885] erofs: options -> noacl, [ 823.816770] squashfs: SQUASHFS error: unable to read xattr id index table 07:26:39 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 11) 07:26:39 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040004c0000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:39 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000000606000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) [ 823.862130] erofs: root inode @ nid 0 [ 823.874575] erofs: bogus i_mode (0) @ nid 0 [ 823.883077] squashfs: SQUASHFS error: unable to read fragment index table 07:26:39 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:39 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 30) [ 823.909028] erofs: root inode @ nid 36 [ 823.914247] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:39 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000000004000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c10100", 0x1f0}], 0x0, &(0x7f0000000080)) 07:26:39 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000600000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 823.959278] erofs: unmounted for /dev/loop2 [ 823.967703] FAULT_INJECTION: forcing a failure. [ 823.967703] name failslab, interval 1, probability 0, space 0, times 0 [ 823.994279] CPU: 1 PID: 30018 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 824.002169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 824.011506] Call Trace: [ 824.014080] dump_stack+0x1fc/0x2ef [ 824.017690] should_fail.cold+0xa/0xf [ 824.021481] ? setup_fault_attr+0x200/0x200 [ 824.025783] ? lock_acquire+0x170/0x3c0 [ 824.029757] __should_failslab+0x115/0x180 [ 824.033982] should_failslab+0x5/0x10 [ 824.037762] kmem_cache_alloc_trace+0x284/0x380 [ 824.042410] ? loop_info64_to_compat+0x5e0/0x5e0 [ 824.047145] __kthread_create_on_node+0xd2/0x410 [ 824.051882] ? kthread_parkme+0xa0/0xa0 [ 824.055839] ? lock_acquire+0x170/0x3c0 [ 824.059794] ? lo_ioctl+0x1bb/0x20e0 [ 824.063494] ? __mutex_lock+0x368/0x1190 [ 824.067534] ? lock_downgrade+0x720/0x720 [ 824.071665] ? check_preemption_disabled+0x41/0x280 [ 824.076678] ? loop_info64_to_compat+0x5e0/0x5e0 [ 824.081440] kthread_create_on_node+0xbb/0xf0 [ 824.085916] ? __kthread_create_on_node+0x410/0x410 [ 824.090919] ? __fget+0x356/0x510 [ 824.094363] ? do_dup2+0x450/0x450 [ 824.097886] ? __lockdep_init_map+0x100/0x5a0 [ 824.102365] ? __lockdep_init_map+0x100/0x5a0 [ 824.106844] lo_ioctl+0xae5/0x20e0 [ 824.110367] ? loop_set_status64+0x110/0x110 [ 824.114755] blkdev_ioctl+0x5cb/0x1a80 [ 824.118622] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 824.123983] ? blkpg_ioctl+0x9d0/0x9d0 [ 824.127856] ? mark_held_locks+0xf0/0xf0 [ 824.131901] ? mark_held_locks+0xf0/0xf0 [ 824.135947] ? debug_check_no_obj_freed+0x201/0x490 [ 824.140952] ? lock_downgrade+0x720/0x720 [ 824.145086] block_ioctl+0xe9/0x130 [ 824.148698] ? blkdev_fallocate+0x3f0/0x3f0 [ 824.153001] do_vfs_ioctl+0xcdb/0x12e0 [ 824.156881] ? lock_downgrade+0x720/0x720 [ 824.161021] ? check_preemption_disabled+0x41/0x280 [ 824.166019] ? ioctl_preallocate+0x200/0x200 [ 824.170412] ? __fget+0x356/0x510 [ 824.173845] ? do_dup2+0x450/0x450 [ 824.177381] ? do_sys_open+0x2bf/0x520 [ 824.181254] ksys_ioctl+0x9b/0xc0 [ 824.184694] __x64_sys_ioctl+0x6f/0xb0 [ 824.188562] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 824.193150] do_syscall_64+0xf9/0x620 [ 824.196949] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 824.202122] RIP: 0033:0x7fd12fca3e07 [ 824.205817] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 824.224703] RSP: 002b:00007fd12e618f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 824.232392] RAX: ffffffffffffffda RBX: 00007fd12fced9c8 RCX: 00007fd12fca3e07 [ 824.239654] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 824.246921] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 824.254227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 824.261485] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 07:26:40 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 12) [ 824.443388] erofs: read_super, device -> /dev/loop5 [ 824.448436] erofs: options -> noacl, [ 824.463292] erofs: root inode @ nid 0 [ 824.468688] squashfs: SQUASHFS error: unable to read xattr id index table [ 824.469366] squashfs: SQUASHFS error: unable to read fragment index table [ 824.484545] erofs: bogus i_mode (0) @ nid 0 [ 824.486279] FAULT_INJECTION: forcing a failure. [ 824.486279] name failslab, interval 1, probability 0, space 0, times 0 [ 824.502490] CPU: 1 PID: 30036 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 824.510379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 824.519733] Call Trace: [ 824.522306] dump_stack+0x1fc/0x2ef [ 824.525936] should_fail.cold+0xa/0xf [ 824.529722] ? setup_fault_attr+0x200/0x200 [ 824.534037] ? lock_acquire+0x170/0x3c0 [ 824.537997] __should_failslab+0x115/0x180 [ 824.542226] should_failslab+0x5/0x10 [ 824.546021] kmem_cache_alloc+0x277/0x370 [ 824.550150] __kernfs_new_node+0xd2/0x680 [ 824.554291] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 824.559029] ? kernfs_activate+0x2c/0x1d0 [ 824.563157] ? lock_downgrade+0x720/0x720 [ 824.567282] ? kernfs_add_one+0x51/0x4c0 [ 824.571324] ? mutex_trylock+0x1a0/0x1a0 [ 824.575367] ? __mutex_unlock_slowpath+0xea/0x610 [ 824.580198] kernfs_new_node+0x92/0x120 [ 824.584165] __kernfs_create_file+0x51/0x340 [ 824.588562] sysfs_add_file_mode_ns+0x226/0x540 [ 824.593327] internal_create_group+0x355/0xb20 [ 824.597903] ? sysfs_remove_link_from_group+0x70/0x70 [ 824.603075] ? lock_downgrade+0x720/0x720 [ 824.607213] lo_ioctl+0xf7c/0x20e0 [ 824.610742] ? loop_set_status64+0x110/0x110 [ 824.615131] blkdev_ioctl+0x5cb/0x1a80 [ 824.619004] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 824.624359] ? blkpg_ioctl+0x9d0/0x9d0 [ 824.628233] ? mark_held_locks+0xf0/0xf0 [ 824.632276] ? mark_held_locks+0xf0/0xf0 [ 824.636320] ? debug_check_no_obj_freed+0x201/0x490 [ 824.641319] ? lock_downgrade+0x720/0x720 [ 824.645706] block_ioctl+0xe9/0x130 [ 824.649324] ? blkdev_fallocate+0x3f0/0x3f0 [ 824.653628] do_vfs_ioctl+0xcdb/0x12e0 [ 824.657508] ? lock_downgrade+0x720/0x720 [ 824.661642] ? check_preemption_disabled+0x41/0x280 [ 824.666638] ? ioctl_preallocate+0x200/0x200 [ 824.671028] ? __fget+0x356/0x510 [ 824.674470] ? do_dup2+0x450/0x450 [ 824.677992] ? do_sys_open+0x2bf/0x520 [ 824.681861] ksys_ioctl+0x9b/0xc0 [ 824.685294] __x64_sys_ioctl+0x6f/0xb0 [ 824.689163] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 824.693733] do_syscall_64+0xf9/0x620 [ 824.697527] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 824.702698] RIP: 0033:0x7fd12fca3e07 [ 824.706393] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 824.725273] RSP: 002b:00007fd12e618f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 824.732959] RAX: ffffffffffffffda RBX: 00007fd12fced9c8 RCX: 00007fd12fca3e07 [ 824.740226] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 824.747487] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 824.754739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 824.761985] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 07:26:40 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000680000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 824.867865] FAULT_INJECTION: forcing a failure. [ 824.867865] name failslab, interval 1, probability 0, space 0, times 0 [ 824.871120] erofs: read_super, device -> /dev/loop1 [ 824.896044] erofs: options -> noacl,user_xattr, [ 824.899784] CPU: 0 PID: 30045 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 824.903064] erofs: root inode @ nid 36 [ 824.908603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 824.908609] Call Trace: [ 824.908629] dump_stack+0x1fc/0x2ef [ 824.908650] should_fail.cold+0xa/0xf [ 824.908667] ? setup_fault_attr+0x200/0x200 [ 824.908691] ? lock_downgrade+0x720/0x720 [ 824.915779] erofs: mounted on /dev/loop1 with opts: noacl. [ 824.921912] __should_failslab+0x115/0x180 [ 824.921931] should_failslab+0x5/0x10 [ 824.921944] __kmalloc+0x2ab/0x3c0 [ 824.921958] ? ext4_find_extent+0x9bb/0xc70 [ 824.921971] ext4_find_extent+0x9bb/0xc70 [ 824.921991] ext4_ext_map_blocks+0x1c0/0x7390 [ 824.922014] ? __lock_acquire+0x6de/0x3ff0 [ 824.922033] ? mark_held_locks+0xf0/0xf0 [ 824.922045] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 824.922060] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 824.989212] ? mark_held_locks+0xf0/0xf0 [ 824.993274] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 824.998102] ? ext4_es_lookup_extent+0x375/0xb60 [ 825.002856] ? ext4_map_blocks+0x59f/0x1a50 [ 825.007177] ? lock_acquire+0x170/0x3c0 [ 825.011155] ? ext4_map_blocks+0x740/0x1a50 [ 825.015463] ext4_map_blocks+0x7a2/0x1a50 [ 825.019599] ? check_preemption_disabled+0x41/0x280 [ 825.024596] ? ext4_issue_zeroout+0x160/0x160 [ 825.029073] ? __brelse+0x84/0xa0 [ 825.032511] ? __ext4_new_inode+0x2eb/0x5a20 [ 825.036902] ext4_getblk+0xad/0x4f0 [ 825.040523] ? ext4_iomap_begin+0xe00/0xe00 [ 825.044836] ? ext4_free_inode+0x1780/0x1780 [ 825.049228] ? debug_check_no_obj_freed+0x201/0x490 [ 825.054230] ? __dquot_initialize+0x298/0xb70 [ 825.058711] ext4_bread+0x7c/0x210 [ 825.062233] ? ext4_getblk+0x4f0/0x4f0 [ 825.066113] ? dquot_initialize_needed+0x290/0x290 [ 825.071029] ? trace_hardirqs_off+0x64/0x200 [ 825.075432] ext4_append+0x155/0x370 [ 825.079146] ext4_mkdir+0x5bd/0xe10 [ 825.082774] ? ext4_init_dot_dotdot+0x600/0x600 [ 825.087427] ? generic_permission+0x116/0x4d0 [ 825.091903] ? inode_permission.part.0+0x10c/0x450 [ 825.096813] vfs_mkdir+0x508/0x7a0 [ 825.100344] do_mkdirat+0x262/0x2d0 [ 825.103964] ? __ia32_sys_mknod+0x120/0x120 [ 825.108275] ? trace_hardirqs_off_caller+0x6e/0x210 [ 825.113277] ? do_syscall_64+0x21/0x620 [ 825.117230] do_syscall_64+0xf9/0x620 [ 825.121017] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 825.126192] RIP: 0033:0x7ff4b2bea157 [ 825.129888] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 825.148770] RSP: 002b:00007ff4b155ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 825.156458] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007ff4b2bea157 [ 825.163714] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 825.170972] RBP: 00007ff4b1560020 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 825.178219] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 825.185466] R13: 0000000020000100 R14: 00007ff4b155ffe0 R15: 0000000020000140 07:26:40 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:40 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:41 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 13) 07:26:41 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1f0}], 0x0, &(0x7f0000000080)) [ 825.270403] erofs: unmounted for /dev/loop1 07:26:41 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 31) 07:26:41 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040006c0000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 825.425737] FAULT_INJECTION: forcing a failure. [ 825.425737] name failslab, interval 1, probability 0, space 0, times 0 [ 825.447938] CPU: 0 PID: 30066 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 825.455840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 825.465181] Call Trace: [ 825.467772] dump_stack+0x1fc/0x2ef [ 825.471397] should_fail.cold+0xa/0xf [ 825.475193] ? setup_fault_attr+0x200/0x200 [ 825.479496] ? lock_downgrade+0x720/0x720 [ 825.483634] __should_failslab+0x115/0x180 [ 825.487855] should_failslab+0x5/0x10 [ 825.491636] __kmalloc+0x2ab/0x3c0 [ 825.495163] ? ext4_find_extent+0x9bb/0xc70 [ 825.499474] ext4_find_extent+0x9bb/0xc70 [ 825.503609] ext4_ext_map_blocks+0x1c0/0x7390 [ 825.508090] ? __lock_acquire+0x6de/0x3ff0 [ 825.512310] ? mark_held_locks+0xf0/0xf0 [ 825.516353] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 825.521699] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 825.526883] ? mark_held_locks+0xf0/0xf0 [ 825.530939] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 825.535774] ? ext4_es_lookup_extent+0x375/0xb60 [ 825.540514] ? ext4_map_blocks+0x59f/0x1a50 [ 825.544832] ? lock_acquire+0x170/0x3c0 [ 825.548802] ? ext4_map_blocks+0x740/0x1a50 [ 825.553126] ext4_map_blocks+0x7a2/0x1a50 [ 825.557259] ? check_preemption_disabled+0x41/0x280 [ 825.562260] ? ext4_issue_zeroout+0x160/0x160 [ 825.566756] ? __brelse+0x84/0xa0 [ 825.570190] ? __ext4_new_inode+0x2eb/0x5a20 [ 825.574584] ext4_getblk+0xad/0x4f0 [ 825.578199] ? ext4_iomap_begin+0xe00/0xe00 [ 825.582502] ? ext4_free_inode+0x1780/0x1780 [ 825.586905] ? debug_check_no_obj_freed+0x201/0x490 [ 825.591901] ? __dquot_initialize+0x298/0xb70 [ 825.596377] ext4_bread+0x7c/0x210 [ 825.599903] ? ext4_getblk+0x4f0/0x4f0 [ 825.603778] ? dquot_initialize_needed+0x290/0x290 [ 825.608689] ? trace_hardirqs_off+0x64/0x200 [ 825.613083] ext4_append+0x155/0x370 [ 825.616791] ext4_mkdir+0x5bd/0xe10 [ 825.620403] ? ext4_init_dot_dotdot+0x600/0x600 [ 825.625055] ? generic_permission+0x116/0x4d0 [ 825.629535] ? inode_permission.part.0+0x10c/0x450 [ 825.634449] vfs_mkdir+0x508/0x7a0 [ 825.637973] do_mkdirat+0x262/0x2d0 [ 825.641599] ? __ia32_sys_mknod+0x120/0x120 [ 825.646251] ? trace_hardirqs_off_caller+0x6e/0x210 [ 825.651357] ? do_syscall_64+0x21/0x620 [ 825.655314] do_syscall_64+0xf9/0x620 [ 825.659125] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 825.664305] RIP: 0033:0x7ff4b2bea157 [ 825.668026] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 825.686915] RSP: 002b:00007ff4b155ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 825.694603] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007ff4b2bea157 [ 825.701852] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 825.709117] RBP: 00007ff4b1560020 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 825.716366] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 825.723615] R13: 0000000020000100 R14: 00007ff4b155ffe0 R15: 0000000020000140 [ 825.746482] FAULT_INJECTION: forcing a failure. [ 825.746482] name failslab, interval 1, probability 0, space 0, times 0 [ 825.761590] CPU: 1 PID: 30073 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 825.769477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 825.778812] Call Trace: [ 825.781383] dump_stack+0x1fc/0x2ef [ 825.785005] should_fail.cold+0xa/0xf [ 825.788800] ? setup_fault_attr+0x200/0x200 [ 825.793103] ? lock_acquire+0x170/0x3c0 [ 825.797073] __should_failslab+0x115/0x180 [ 825.801299] should_failslab+0x5/0x10 [ 825.805078] kmem_cache_alloc+0x277/0x370 [ 825.809217] __kernfs_new_node+0xd2/0x680 [ 825.813359] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 825.818095] ? kernfs_activate+0x2c/0x1d0 [ 825.822221] ? lock_downgrade+0x720/0x720 [ 825.826346] ? kernfs_add_one+0x51/0x4c0 [ 825.830394] ? mutex_trylock+0x1a0/0x1a0 [ 825.834437] ? __mutex_unlock_slowpath+0xea/0x610 [ 825.839263] kernfs_new_node+0x92/0x120 [ 825.843217] __kernfs_create_file+0x51/0x340 [ 825.847971] sysfs_add_file_mode_ns+0x226/0x540 [ 825.852629] internal_create_group+0x355/0xb20 [ 825.857196] ? sysfs_remove_link_from_group+0x70/0x70 [ 825.862365] ? lock_downgrade+0x720/0x720 [ 825.866512] lo_ioctl+0xf7c/0x20e0 [ 825.870046] ? loop_set_status64+0x110/0x110 [ 825.874436] blkdev_ioctl+0x5cb/0x1a80 [ 825.878319] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 825.883664] ? blkpg_ioctl+0x9d0/0x9d0 [ 825.887531] ? mark_held_locks+0xf0/0xf0 [ 825.891573] ? mark_held_locks+0xf0/0xf0 [ 825.895615] ? debug_check_no_obj_freed+0x201/0x490 [ 825.900615] ? lock_downgrade+0x720/0x720 [ 825.904745] block_ioctl+0xe9/0x130 [ 825.908351] ? blkdev_fallocate+0x3f0/0x3f0 [ 825.912675] do_vfs_ioctl+0xcdb/0x12e0 [ 825.916550] ? lock_downgrade+0x720/0x720 [ 825.920681] ? check_preemption_disabled+0x41/0x280 [ 825.925691] ? ioctl_preallocate+0x200/0x200 [ 825.930083] ? __fget+0x356/0x510 [ 825.933517] ? do_dup2+0x450/0x450 [ 825.937052] ? do_sys_open+0x2bf/0x520 [ 825.940935] ksys_ioctl+0x9b/0xc0 [ 825.944372] __x64_sys_ioctl+0x6f/0xb0 [ 825.948242] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 825.952802] do_syscall_64+0xf9/0x620 [ 825.956584] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 825.961754] RIP: 0033:0x7fd12fca3e07 [ 825.965453] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 825.984332] RSP: 002b:00007fd12e618f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 825.992104] RAX: ffffffffffffffda RBX: 00007fd12fced9c8 RCX: 00007fd12fca3e07 [ 825.999356] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 826.006604] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 826.013857] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 826.021130] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 07:26:41 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 32) [ 826.089162] erofs: read_super, device -> /dev/loop5 [ 826.089399] erofs: read_super, device -> /dev/loop1 [ 826.100388] erofs: options -> noacl, [ 826.106138] squashfs: SQUASHFS error: unable to read xattr id index table [ 826.114507] squashfs: SQUASHFS error: unable to read fragment index table [ 826.116930] erofs: root inode @ nid 0 [ 826.124469] erofs: options -> noacl,user_xattr, [ 826.133767] erofs: root inode @ nid 36 [ 826.150185] erofs: bogus i_mode (0) @ nid 0 07:26:41 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1f0}], 0x0, &(0x7f0000000080)) 07:26:41 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:41 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 826.194452] erofs: mounted on /dev/loop1 with opts: noacl. 07:26:42 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 14) [ 826.263715] erofs: unmounted for /dev/loop1 [ 826.285790] FAULT_INJECTION: forcing a failure. [ 826.285790] name failslab, interval 1, probability 0, space 0, times 0 [ 826.297258] CPU: 1 PID: 30088 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 826.305146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 826.314504] Call Trace: [ 826.317102] dump_stack+0x1fc/0x2ef [ 826.320742] should_fail.cold+0xa/0xf [ 826.324556] ? setup_fault_attr+0x200/0x200 [ 826.328886] ? __es_tree_search.isra.0+0x1af/0x210 [ 826.333836] __should_failslab+0x115/0x180 [ 826.338078] should_failslab+0x5/0x10 [ 826.341886] kmem_cache_alloc+0x3f/0x370 [ 826.346532] __es_insert_extent+0x39b/0x13b0 [ 826.350954] ext4_es_insert_extent+0x22e/0x5e0 [ 826.355541] ? ext4_map_blocks+0x59f/0x1a50 [ 826.359870] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 826.365685] ext4_map_blocks+0xa2a/0x1a50 [ 826.369845] ? ext4_issue_zeroout+0x160/0x160 [ 826.374349] ? __brelse+0x84/0xa0 [ 826.377808] ? __ext4_new_inode+0x2eb/0x5a20 [ 826.382225] ext4_getblk+0xad/0x4f0 [ 826.385862] ? ext4_iomap_begin+0xe00/0xe00 [ 826.390189] ? ext4_free_inode+0x1780/0x1780 [ 826.394601] ? debug_check_no_obj_freed+0x201/0x490 [ 826.399623] ? __dquot_initialize+0x298/0xb70 [ 826.404127] ext4_bread+0x7c/0x210 [ 826.407673] ? ext4_getblk+0x4f0/0x4f0 [ 826.411567] ? dquot_initialize_needed+0x290/0x290 [ 826.416501] ? trace_hardirqs_off+0x64/0x200 [ 826.420917] ext4_append+0x155/0x370 [ 826.424638] ext4_mkdir+0x5bd/0xe10 [ 826.428278] ? ext4_init_dot_dotdot+0x600/0x600 [ 826.432956] ? generic_permission+0x116/0x4d0 [ 826.437456] ? inode_permission.part.0+0x10c/0x450 [ 826.442393] vfs_mkdir+0x508/0x7a0 [ 826.445943] do_mkdirat+0x262/0x2d0 [ 826.449574] ? __ia32_sys_mknod+0x120/0x120 [ 826.453903] ? trace_hardirqs_off_caller+0x6e/0x210 [ 826.458927] ? do_syscall_64+0x21/0x620 [ 826.462910] do_syscall_64+0xf9/0x620 [ 826.466716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 826.471907] RIP: 0033:0x7ff4b2bea157 [ 826.475625] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 826.494528] RSP: 002b:00007ff4b155ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 826.502244] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007ff4b2bea157 [ 826.509514] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 826.516786] RBP: 00007ff4b1560020 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 826.524060] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 826.531338] R13: 0000000020000100 R14: 00007ff4b155ffe0 R15: 0000000020000140 07:26:42 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000740000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 826.602740] erofs: read_super, device -> /dev/loop2 [ 826.609757] erofs: options -> noacl,user_xattr, [ 826.633132] squashfs: SQUASHFS error: unable to read fragment index table [ 826.639121] erofs: root inode @ nid 36 [ 826.650526] erofs: mounted on /dev/loop2 with opts: noacl. [ 826.697542] squashfs: SQUASHFS error: unable to read xattr id index table [ 826.707835] FAULT_INJECTION: forcing a failure. [ 826.707835] name failslab, interval 1, probability 0, space 0, times 0 [ 826.724791] CPU: 1 PID: 30105 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 826.732686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 826.742031] Call Trace: [ 826.745047] dump_stack+0x1fc/0x2ef [ 826.748661] should_fail.cold+0xa/0xf [ 826.752449] ? setup_fault_attr+0x200/0x200 [ 826.756753] ? lock_acquire+0x170/0x3c0 [ 826.760710] __should_failslab+0x115/0x180 [ 826.764942] should_failslab+0x5/0x10 [ 826.768728] kmem_cache_alloc+0x277/0x370 [ 826.772863] __kernfs_new_node+0xd2/0x680 [ 826.777007] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 826.781752] ? __mutex_unlock_slowpath+0xea/0x610 [ 826.786576] ? wait_for_completion_io+0x10/0x10 [ 826.791239] ? kernfs_next_descendant_post+0x19c/0x290 [ 826.796505] kernfs_new_node+0x92/0x120 [ 826.800464] __kernfs_create_file+0x51/0x340 [ 826.804857] sysfs_add_file_mode_ns+0x226/0x540 [ 826.809631] internal_create_group+0x355/0xb20 [ 826.814204] ? sysfs_remove_link_from_group+0x70/0x70 [ 826.819372] ? lock_downgrade+0x720/0x720 [ 826.823506] lo_ioctl+0xf7c/0x20e0 [ 826.827042] ? loop_set_status64+0x110/0x110 [ 826.831452] blkdev_ioctl+0x5cb/0x1a80 [ 826.835335] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 826.840681] ? blkpg_ioctl+0x9d0/0x9d0 [ 826.844563] ? mark_held_locks+0xf0/0xf0 [ 826.848605] ? mark_held_locks+0xf0/0xf0 [ 826.852659] ? debug_check_no_obj_freed+0x201/0x490 [ 826.857666] ? lock_downgrade+0x720/0x720 [ 826.861802] block_ioctl+0xe9/0x130 [ 826.865417] ? blkdev_fallocate+0x3f0/0x3f0 [ 826.869718] do_vfs_ioctl+0xcdb/0x12e0 [ 826.873589] ? lock_downgrade+0x720/0x720 [ 826.877721] ? check_preemption_disabled+0x41/0x280 [ 826.882717] ? ioctl_preallocate+0x200/0x200 [ 826.887109] ? __fget+0x356/0x510 [ 826.890544] ? do_dup2+0x450/0x450 [ 826.894063] ? do_sys_open+0x2bf/0x520 [ 826.897936] ksys_ioctl+0x9b/0xc0 [ 826.901384] __x64_sys_ioctl+0x6f/0xb0 [ 826.905252] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 826.909813] do_syscall_64+0xf9/0x620 [ 826.913596] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 826.918775] RIP: 0033:0x7fd12fca3e07 [ 826.922471] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 826.941347] RSP: 002b:00007fd12e618f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 826.949032] RAX: ffffffffffffffda RBX: 00007fd12fced9c8 RCX: 00007fd12fca3e07 [ 826.956285] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 826.963541] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 826.970790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 826.978036] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 07:26:42 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 33) [ 827.024411] erofs: unmounted for /dev/loop2 07:26:42 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 827.048157] erofs: read_super, device -> /dev/loop1 07:26:42 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1f8}], 0x0, &(0x7f0000000080)) [ 827.069121] erofs: options -> noacl,user_xattr, [ 827.074722] erofs: root inode @ nid 36 [ 827.078699] erofs: mounted on /dev/loop1 with opts: noacl. [ 827.084650] erofs: read_super, device -> /dev/loop5 [ 827.089662] erofs: options -> noacl, [ 827.103538] erofs: root inode @ nid 0 [ 827.107379] erofs: bogus i_mode (0) @ nid 0 07:26:42 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040007a0000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:42 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 15) [ 827.172245] erofs: unmounted for /dev/loop1 07:26:43 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 827.244641] FAULT_INJECTION: forcing a failure. [ 827.244641] name failslab, interval 1, probability 0, space 0, times 0 [ 827.257674] CPU: 0 PID: 30130 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 827.265662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 827.275013] Call Trace: [ 827.277614] dump_stack+0x1fc/0x2ef [ 827.281255] should_fail.cold+0xa/0xf [ 827.285064] ? setup_fault_attr+0x200/0x200 [ 827.289392] ? lock_acquire+0x170/0x3c0 [ 827.292557] squashfs: SQUASHFS error: unable to read fragment index table [ 827.293377] __should_failslab+0x115/0x180 [ 827.304517] should_failslab+0x5/0x10 [ 827.308329] __kmalloc_track_caller+0x2a6/0x3c0 [ 827.311427] squashfs: SQUASHFS error: unable to read xattr id index table [ 827.313514] ? strndup_user+0x70/0x120 [ 827.313535] memdup_user+0x22/0xb0 [ 827.313553] strndup_user+0x70/0x120 [ 827.313568] ksys_mount+0x34/0x130 [ 827.313585] __x64_sys_mount+0xba/0x150 [ 827.339074] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 827.343661] do_syscall_64+0xf9/0x620 [ 827.347474] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 827.352668] RIP: 0033:0x7ff4b2bec57a [ 827.356386] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 827.375290] RSP: 002b:00007ff4b155ff88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 827.383001] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007ff4b2bec57a 07:26:43 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 827.390271] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff4b155ffe0 [ 827.397542] RBP: 00007ff4b1560020 R08: 00007ff4b1560020 R09: 0000000020000000 [ 827.404812] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 827.412090] R13: 0000000020000100 R14: 00007ff4b155ffe0 R15: 0000000020000140 07:26:43 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000300000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:43 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 34) 07:26:43 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1f8}], 0x0, &(0x7f0000000080)) [ 827.512840] erofs: read_super, device -> /dev/loop5 [ 827.517914] erofs: options -> noacl, [ 827.527897] erofs: root inode @ nid 0 [ 827.529917] FAULT_INJECTION: forcing a failure. [ 827.529917] name failslab, interval 1, probability 0, space 0, times 0 [ 827.533579] erofs: bogus i_mode (0) @ nid 0 [ 827.548243] CPU: 0 PID: 30149 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 827.556132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 827.565479] Call Trace: [ 827.568064] dump_stack+0x1fc/0x2ef [ 827.571692] should_fail.cold+0xa/0xf [ 827.575488] ? setup_fault_attr+0x200/0x200 [ 827.579793] ? lock_acquire+0x170/0x3c0 [ 827.583768] __should_failslab+0x115/0x180 [ 827.588000] should_failslab+0x5/0x10 [ 827.591793] kmem_cache_alloc+0x277/0x370 [ 827.595934] __kernfs_new_node+0xd2/0x680 [ 827.600073] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 827.604830] ? __mutex_unlock_slowpath+0xea/0x610 [ 827.609673] ? wait_for_completion_io+0x10/0x10 [ 827.614335] ? kernfs_next_descendant_post+0x19c/0x290 [ 827.619602] kernfs_new_node+0x92/0x120 [ 827.623583] __kernfs_create_file+0x51/0x340 [ 827.627987] sysfs_add_file_mode_ns+0x226/0x540 [ 827.632658] internal_create_group+0x355/0xb20 [ 827.637224] ? sysfs_remove_link_from_group+0x70/0x70 [ 827.642409] ? lock_downgrade+0x720/0x720 [ 827.647002] lo_ioctl+0xf7c/0x20e0 [ 827.650550] ? loop_set_status64+0x110/0x110 [ 827.654946] blkdev_ioctl+0x5cb/0x1a80 [ 827.658822] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 827.664184] ? blkpg_ioctl+0x9d0/0x9d0 [ 827.668087] ? mark_held_locks+0xf0/0xf0 [ 827.672144] ? mark_held_locks+0xf0/0xf0 [ 827.676201] ? debug_check_no_obj_freed+0x201/0x490 [ 827.681217] ? lock_downgrade+0x720/0x720 [ 827.685397] block_ioctl+0xe9/0x130 [ 827.689035] ? blkdev_fallocate+0x3f0/0x3f0 [ 827.693358] do_vfs_ioctl+0xcdb/0x12e0 [ 827.697233] ? lock_downgrade+0x720/0x720 [ 827.701380] ? check_preemption_disabled+0x41/0x280 [ 827.706402] ? ioctl_preallocate+0x200/0x200 [ 827.710809] ? __fget+0x356/0x510 [ 827.714248] ? do_dup2+0x450/0x450 [ 827.717771] ? do_sys_open+0x2bf/0x520 [ 827.721657] ksys_ioctl+0x9b/0xc0 [ 827.725116] __x64_sys_ioctl+0x6f/0xb0 [ 827.729005] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 827.733580] do_syscall_64+0xf9/0x620 [ 827.737365] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 827.742632] RIP: 0033:0x7fd12fca3e07 [ 827.746348] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 827.765246] RSP: 002b:00007fd12e618f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 827.772945] RAX: ffffffffffffffda RBX: 00007fd12fced9c8 RCX: 00007fd12fca3e07 [ 827.780192] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 827.787440] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 827.794705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 827.801966] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 [ 827.908063] erofs: read_super, device -> /dev/loop1 [ 827.922841] FAULT_INJECTION: forcing a failure. [ 827.922841] name failslab, interval 1, probability 0, space 0, times 0 [ 827.928907] erofs: options -> noacl,user_xattr, [ 827.934319] CPU: 1 PID: 30162 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 827.941758] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 827.946738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 827.946744] Call Trace: [ 827.946767] dump_stack+0x1fc/0x2ef [ 827.946787] should_fail.cold+0xa/0xf [ 827.946805] ? setup_fault_attr+0x200/0x200 [ 827.946818] ? lock_acquire+0x170/0x3c0 [ 827.946836] __should_failslab+0x115/0x180 [ 827.966223] erofs: root inode @ nid 36 [ 827.969101] should_failslab+0x5/0x10 [ 827.969118] __kmalloc_track_caller+0x2a6/0x3c0 [ 827.969134] ? strndup_user+0x70/0x120 [ 827.969153] memdup_user+0x22/0xb0 [ 827.969170] strndup_user+0x70/0x120 [ 827.969189] ksys_mount+0x34/0x130 [ 827.983181] squashfs: SQUASHFS error: unable to read xattr id index table [ 827.985457] __x64_sys_mount+0xba/0x150 [ 827.985475] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 827.985490] do_syscall_64+0xf9/0x620 [ 827.985511] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 827.985523] RIP: 0033:0x7ff4b2bec57a 07:26:43 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x14, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 827.985535] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 827.985546] RSP: 002b:00007ff4b155ff88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 827.999568] erofs: mounted on /dev/loop1 with opts: noacl. [ 828.001743] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007ff4b2bec57a [ 828.001752] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff4b155ffe0 [ 828.001761] RBP: 00007ff4b1560020 R08: 00007ff4b1560020 R09: 0000000020000000 [ 828.001770] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 07:26:43 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 35) [ 828.001778] R13: 0000000020000100 R14: 00007ff4b155ffe0 R15: 0000000020000140 [ 828.126763] squashfs: SQUASHFS error: unable to read xattr id index table [ 828.139291] squashfs: SQUASHFS error: unable to read fragment index table 07:26:43 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000820300000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:44 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 16) 07:26:44 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 828.219708] erofs: read_super, device -> /dev/loop5 [ 828.234924] erofs: options -> noacl, [ 828.240108] erofs: root inode @ nid 0 [ 828.246347] erofs: bogus i_mode (0) @ nid 0 [ 828.253701] erofs: unmounted for /dev/loop1 07:26:44 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1f8}], 0x0, &(0x7f0000000080)) 07:26:44 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x37, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 828.366714] FAULT_INJECTION: forcing a failure. [ 828.366714] name failslab, interval 1, probability 0, space 0, times 0 [ 828.394137] CPU: 0 PID: 30194 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 828.402037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 828.411387] Call Trace: [ 828.413977] dump_stack+0x1fc/0x2ef [ 828.417611] should_fail.cold+0xa/0xf [ 828.421419] ? setup_fault_attr+0x200/0x200 [ 828.425748] ? lock_downgrade+0x720/0x720 [ 828.429906] ? check_preemption_disabled+0x41/0x280 [ 828.434907] __should_failslab+0x115/0x180 [ 828.439123] should_failslab+0x5/0x10 [ 828.442905] kmem_cache_alloc+0x277/0x370 [ 828.447035] ext4_mb_new_blocks+0x60a/0x4370 [ 828.451431] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 828.456426] ? ext4_cache_extents+0x68/0x2d0 [ 828.460853] ? ext4_find_extent+0x9bb/0xc70 [ 828.465161] ? ext4_discard_preallocations+0xfb0/0xfb0 [ 828.470430] ? ext4_ext_search_right+0x2c7/0xb60 [ 828.475339] ? ext4_inode_to_goal_block+0x2d2/0x3e0 [ 828.480343] ext4_ext_map_blocks+0x2aa2/0x7390 [ 828.484915] ? __lock_acquire+0x6de/0x3ff0 [ 828.489141] ? mark_held_locks+0xf0/0xf0 [ 828.493187] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 828.498531] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 828.503706] ? mark_held_locks+0xf0/0xf0 [ 828.507761] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 828.512587] ? ext4_es_lookup_extent+0x375/0xb60 [ 828.517327] ? ext4_map_blocks+0x59f/0x1a50 [ 828.521637] ext4_map_blocks+0x7a2/0x1a50 [ 828.525783] ? check_preemption_disabled+0x41/0x280 [ 828.530783] ? ext4_issue_zeroout+0x160/0x160 [ 828.535271] ? __brelse+0x84/0xa0 [ 828.538725] ? __ext4_new_inode+0x2eb/0x5a20 [ 828.543147] ext4_getblk+0xad/0x4f0 [ 828.547120] ? ext4_iomap_begin+0xe00/0xe00 [ 828.551426] ? ext4_free_inode+0x1780/0x1780 [ 828.555818] ? debug_check_no_obj_freed+0x201/0x490 [ 828.560825] ? __dquot_initialize+0x298/0xb70 [ 828.565306] ext4_bread+0x7c/0x210 [ 828.568826] ? ext4_getblk+0x4f0/0x4f0 [ 828.572692] ? dquot_initialize_needed+0x290/0x290 [ 828.577604] ? trace_hardirqs_off+0x64/0x200 [ 828.582022] ext4_append+0x155/0x370 [ 828.585720] ext4_mkdir+0x5bd/0xe10 [ 828.589335] ? ext4_init_dot_dotdot+0x600/0x600 [ 828.593987] ? generic_permission+0x116/0x4d0 [ 828.598466] ? inode_permission.part.0+0x10c/0x450 [ 828.603378] vfs_mkdir+0x508/0x7a0 [ 828.606900] do_mkdirat+0x262/0x2d0 [ 828.610511] ? __ia32_sys_mknod+0x120/0x120 [ 828.614829] ? trace_hardirqs_off_caller+0x6e/0x210 [ 828.619835] ? do_syscall_64+0x21/0x620 [ 828.623803] do_syscall_64+0xf9/0x620 [ 828.627601] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 828.632771] RIP: 0033:0x7ff4b2bea157 [ 828.636462] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 828.655838] RSP: 002b:00007ff4b155ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 07:26:44 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040008f0300000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 828.663532] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007ff4b2bea157 [ 828.670795] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 828.678051] RBP: 00007ff4b1560020 R08: 0000000000000000 R09: 00007ff4b15601d0 [ 828.685311] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 828.692570] R13: 0000000020000100 R14: 00007ff4b155ffe0 R15: 0000000020000140 [ 828.733283] FAULT_INJECTION: forcing a failure. [ 828.733283] name failslab, interval 1, probability 0, space 0, times 0 [ 828.750854] CPU: 1 PID: 30205 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 828.758748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 828.768098] Call Trace: [ 828.770671] dump_stack+0x1fc/0x2ef [ 828.774282] should_fail.cold+0xa/0xf [ 828.778067] ? setup_fault_attr+0x200/0x200 [ 828.782388] ? lock_acquire+0x170/0x3c0 [ 828.786357] __should_failslab+0x115/0x180 [ 828.790574] should_failslab+0x5/0x10 [ 828.794358] kmem_cache_alloc+0x277/0x370 [ 828.798492] __kernfs_new_node+0xd2/0x680 [ 828.802626] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 828.807381] ? __mutex_unlock_slowpath+0xea/0x610 [ 828.812205] ? wait_for_completion_io+0x10/0x10 [ 828.816855] ? kernfs_next_descendant_post+0x19c/0x290 [ 828.822117] kernfs_new_node+0x92/0x120 [ 828.826077] __kernfs_create_file+0x51/0x340 [ 828.830471] sysfs_add_file_mode_ns+0x226/0x540 [ 828.835126] internal_create_group+0x355/0xb20 [ 828.839693] ? sysfs_remove_link_from_group+0x70/0x70 [ 828.844875] ? lock_downgrade+0x720/0x720 [ 828.849026] lo_ioctl+0xf7c/0x20e0 [ 828.852564] ? loop_set_status64+0x110/0x110 [ 828.856971] blkdev_ioctl+0x5cb/0x1a80 [ 828.860850] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 828.866190] ? blkpg_ioctl+0x9d0/0x9d0 [ 828.870061] ? mark_held_locks+0xf0/0xf0 [ 828.874105] ? mark_held_locks+0xf0/0xf0 [ 828.878161] ? debug_check_no_obj_freed+0x201/0x490 [ 828.883163] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 828.887913] block_ioctl+0xe9/0x130 [ 828.891524] ? blkdev_fallocate+0x3f0/0x3f0 [ 828.895832] do_vfs_ioctl+0xcdb/0x12e0 [ 828.899709] ? lock_downgrade+0x720/0x720 [ 828.903851] ? check_preemption_disabled+0x41/0x280 [ 828.908847] ? ioctl_preallocate+0x200/0x200 [ 828.913237] ? __fget+0x356/0x510 [ 828.916669] ? do_dup2+0x450/0x450 [ 828.920189] ? do_sys_open+0x2bf/0x520 [ 828.924060] ksys_ioctl+0x9b/0xc0 [ 828.927494] __x64_sys_ioctl+0x6f/0xb0 [ 828.931361] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 828.935922] do_syscall_64+0xf9/0x620 [ 828.939718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 828.944896] RIP: 0033:0x7fd12fca3e07 [ 828.948589] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 828.967555] RSP: 002b:00007fd12e618f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 828.975243] RAX: ffffffffffffffda RBX: 00007fd12fced9c8 RCX: 00007fd12fca3e07 [ 828.982499] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 828.989758] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 828.997006] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 829.004260] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 [ 829.017300] squashfs: SQUASHFS error: unable to read fragment index table 07:26:44 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 829.079446] erofs: read_super, device -> /dev/loop1 [ 829.089016] erofs: options -> noacl,user_xattr, [ 829.096768] erofs: root inode @ nid 36 [ 829.104992] erofs: mounted on /dev/loop1 with opts: noacl. [ 829.116953] erofs: read_super, device -> /dev/loop5 07:26:44 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 17) 07:26:44 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) 07:26:44 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000900300000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 829.123237] squashfs: SQUASHFS error: unable to read xattr id index table [ 829.143114] erofs: options -> noacl, [ 829.151101] erofs: root inode @ nid 0 [ 829.162726] erofs: bogus i_mode (0) @ nid 0 [ 829.167633] erofs: unmounted for /dev/loop1 07:26:44 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x88, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:45 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1fc}], 0x0, &(0x7f0000000080)) [ 829.298124] squashfs: SQUASHFS error: unable to read fragment index table [ 829.320549] erofs: read_super, device -> /dev/loop2 [ 829.340508] erofs: options -> noacl,user_xattr, [ 829.349746] erofs: root inode @ nid 36 [ 829.356816] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:45 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:45 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000910300000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 829.417275] FAULT_INJECTION: forcing a failure. [ 829.417275] name failslab, interval 1, probability 0, space 0, times 0 [ 829.429654] CPU: 1 PID: 30249 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 829.437552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 829.446902] Call Trace: [ 829.449497] dump_stack+0x1fc/0x2ef [ 829.453129] should_fail.cold+0xa/0xf [ 829.456935] ? setup_fault_attr+0x200/0x200 [ 829.461251] ? lock_acquire+0x170/0x3c0 [ 829.465214] __should_failslab+0x115/0x180 [ 829.469433] should_failslab+0x5/0x10 [ 829.473214] kmem_cache_alloc+0x277/0x370 [ 829.477357] __kernfs_new_node+0xd2/0x680 [ 829.481512] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 829.486258] ? __mutex_unlock_slowpath+0xea/0x610 [ 829.491110] ? wait_for_completion_io+0x10/0x10 [ 829.495775] ? kernfs_next_descendant_post+0x19c/0x290 [ 829.501045] kernfs_new_node+0x92/0x120 [ 829.505006] __kernfs_create_file+0x51/0x340 [ 829.509401] sysfs_add_file_mode_ns+0x226/0x540 [ 829.514058] internal_create_group+0x355/0xb20 [ 829.518633] ? sysfs_remove_link_from_group+0x70/0x70 [ 829.523813] ? lock_downgrade+0x720/0x720 [ 829.527949] lo_ioctl+0xf7c/0x20e0 [ 829.531487] ? loop_set_status64+0x110/0x110 [ 829.535875] blkdev_ioctl+0x5cb/0x1a80 [ 829.539748] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 829.545089] ? blkpg_ioctl+0x9d0/0x9d0 [ 829.548958] ? mark_held_locks+0xf0/0xf0 [ 829.553084] ? mark_held_locks+0xf0/0xf0 [ 829.557128] ? debug_check_no_obj_freed+0x201/0x490 [ 829.562126] ? lock_downgrade+0x720/0x720 [ 829.566253] block_ioctl+0xe9/0x130 [ 829.569860] ? blkdev_fallocate+0x3f0/0x3f0 [ 829.574161] do_vfs_ioctl+0xcdb/0x12e0 [ 829.578030] ? lock_downgrade+0x720/0x720 [ 829.582157] ? check_preemption_disabled+0x41/0x280 [ 829.587152] ? ioctl_preallocate+0x200/0x200 [ 829.591544] ? __fget+0x356/0x510 [ 829.594977] ? do_dup2+0x450/0x450 [ 829.598495] ? do_sys_open+0x2bf/0x520 [ 829.602378] ksys_ioctl+0x9b/0xc0 [ 829.605829] __x64_sys_ioctl+0x6f/0xb0 [ 829.609714] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 829.614336] do_syscall_64+0xf9/0x620 [ 829.618122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 829.623297] RIP: 0033:0x7fd12fca3e07 [ 829.626999] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 829.645877] RSP: 002b:00007fd12e618f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 829.653563] RAX: ffffffffffffffda RBX: 00007fd12fced9c8 RCX: 00007fd12fca3e07 [ 829.660821] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 07:26:45 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 829.668078] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 829.675331] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 829.682579] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 [ 829.692973] erofs: unmounted for /dev/loop2 [ 829.713255] erofs: read_super, device -> /dev/loop1 07:26:45 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 18) [ 829.722506] erofs: options -> noacl,user_xattr, [ 829.727429] erofs: read_super, device -> /dev/loop5 [ 829.731094] erofs: root inode @ nid 36 [ 829.736403] erofs: mounted on /dev/loop1 with opts: noacl. [ 829.753070] squashfs: SQUASHFS error: unable to read xattr id index table 07:26:45 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1fc}], 0x0, &(0x7f0000000080)) [ 829.794083] erofs: unmounted for /dev/loop1 [ 829.799688] erofs: options -> noacl, [ 829.810750] erofs: root inode @ nid 0 [ 829.814717] erofs: bogus i_mode (0) @ nid 0 [ 829.883344] squashfs: SQUASHFS error: unable to read fragment index table [ 829.921888] erofs: read_super, device -> /dev/loop2 [ 829.927033] erofs: options -> noacl,user_xattr, [ 829.932511] erofs: root inode @ nid 36 [ 829.936721] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:45 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8a, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:45 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000920300000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 829.984293] squashfs: SQUASHFS error: unable to read xattr id index table 07:26:45 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) 07:26:45 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 830.048058] erofs: unmounted for /dev/loop2 07:26:45 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000000004000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c10100000000000001000000000000", 0x1fc}], 0x0, &(0x7f0000000080)) [ 830.113040] FAULT_INJECTION: forcing a failure. [ 830.113040] name failslab, interval 1, probability 0, space 0, times 0 [ 830.124489] CPU: 1 PID: 30284 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 830.132356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 830.141689] Call Trace: [ 830.144259] dump_stack+0x1fc/0x2ef [ 830.147883] should_fail.cold+0xa/0xf [ 830.151680] ? setup_fault_attr+0x200/0x200 [ 830.155984] ? lock_acquire+0x170/0x3c0 [ 830.159943] __should_failslab+0x115/0x180 [ 830.164159] should_failslab+0x5/0x10 [ 830.167939] kmem_cache_alloc+0x277/0x370 [ 830.172071] __kernfs_new_node+0xd2/0x680 [ 830.176202] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 830.180939] ? __mutex_unlock_slowpath+0xea/0x610 [ 830.185765] ? wait_for_completion_io+0x10/0x10 [ 830.190431] ? kernfs_next_descendant_post+0x19c/0x290 [ 830.195690] kernfs_new_node+0x92/0x120 [ 830.199651] __kernfs_create_file+0x51/0x340 [ 830.204041] sysfs_add_file_mode_ns+0x226/0x540 [ 830.208697] internal_create_group+0x355/0xb20 [ 830.213261] ? sysfs_remove_link_from_group+0x70/0x70 [ 830.218443] ? lock_downgrade+0x720/0x720 [ 830.222574] lo_ioctl+0xf7c/0x20e0 [ 830.226098] ? loop_set_status64+0x110/0x110 [ 830.230487] blkdev_ioctl+0x5cb/0x1a80 [ 830.234357] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 830.239697] ? blkpg_ioctl+0x9d0/0x9d0 [ 830.243564] ? mark_held_locks+0xf0/0xf0 [ 830.247615] ? mark_held_locks+0xf0/0xf0 [ 830.251662] ? debug_check_no_obj_freed+0x201/0x490 [ 830.256657] ? lock_downgrade+0x720/0x720 [ 830.260785] block_ioctl+0xe9/0x130 [ 830.264424] ? blkdev_fallocate+0x3f0/0x3f0 [ 830.268733] do_vfs_ioctl+0xcdb/0x12e0 [ 830.272613] ? lock_downgrade+0x720/0x720 [ 830.276752] ? check_preemption_disabled+0x41/0x280 [ 830.281753] ? ioctl_preallocate+0x200/0x200 [ 830.286145] ? __fget+0x356/0x510 [ 830.289576] ? do_dup2+0x450/0x450 [ 830.293095] ? do_sys_open+0x2bf/0x520 [ 830.296969] ksys_ioctl+0x9b/0xc0 [ 830.300407] __x64_sys_ioctl+0x6f/0xb0 [ 830.304276] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 830.308835] do_syscall_64+0xf9/0x620 [ 830.312627] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 830.317807] RIP: 0033:0x7fd12fca3e07 [ 830.321587] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 830.340466] RSP: 002b:00007fd12e618f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 830.348152] RAX: ffffffffffffffda RBX: 00007fd12fced9c8 RCX: 00007fd12fca3e07 [ 830.355401] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 830.362648] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 830.369892] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 830.377141] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 07:26:46 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000930300000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 830.461716] erofs: read_super, device -> /dev/loop5 [ 830.470749] erofs: read_super, device -> /dev/loop1 [ 830.479663] erofs: options -> noacl,user_xattr, [ 830.494296] erofs: options -> noacl, [ 830.501779] erofs: root inode @ nid 36 [ 830.518684] erofs: root inode @ nid 0 [ 830.529065] erofs: mounted on /dev/loop1 with opts: noacl. [ 830.535497] erofs: bogus i_mode (0) @ nid 0 [ 830.543991] squashfs: SQUASHFS error: unable to read xattr id index table [ 830.558370] erofs: read_super, device -> /dev/loop2 07:26:46 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x402, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 830.566190] erofs: options -> noacl,user_xattr, [ 830.573894] squashfs: SQUASHFS error: unable to read fragment index table [ 830.587281] erofs: root inode @ nid 36 [ 830.593046] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:46 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:46 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000940300000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:46 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1fe}], 0x0, &(0x7f0000000080)) 07:26:46 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 19) 07:26:46 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 830.695535] erofs: unmounted for /dev/loop2 [ 830.707122] erofs: unmounted for /dev/loop1 [ 830.840078] squashfs: SQUASHFS error: unable to read xattr id index table [ 830.849653] erofs: read_super, device -> /dev/loop5 [ 830.855761] squashfs: SQUASHFS error: unable to read fragment index table [ 830.876094] erofs: options -> noacl, 07:26:46 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1fe}], 0x0, &(0x7f0000000080)) [ 830.892343] erofs: root inode @ nid 0 [ 830.911983] erofs: bogus i_mode (0) @ nid 0 [ 830.942042] FAULT_INJECTION: forcing a failure. [ 830.942042] name failslab, interval 1, probability 0, space 0, times 0 [ 830.953634] CPU: 0 PID: 30345 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 830.961523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 830.970872] Call Trace: [ 830.973466] dump_stack+0x1fc/0x2ef [ 830.977101] should_fail.cold+0xa/0xf [ 830.980910] ? setup_fault_attr+0x200/0x200 [ 830.985255] ? lock_acquire+0x170/0x3c0 [ 830.989238] __should_failslab+0x115/0x180 [ 830.993477] should_failslab+0x5/0x10 [ 830.997278] __kmalloc+0x2ab/0x3c0 [ 831.000823] ? kobject_get_path+0xbf/0x240 [ 831.005072] kobject_get_path+0xbf/0x240 [ 831.009139] kobject_uevent_env+0x25c/0x1480 [ 831.013560] lo_ioctl+0xff9/0x20e0 [ 831.017104] ? loop_set_status64+0x110/0x110 [ 831.021514] blkdev_ioctl+0x5cb/0x1a80 [ 831.025401] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.030766] ? blkpg_ioctl+0x9d0/0x9d0 [ 831.034654] ? mark_held_locks+0xf0/0xf0 [ 831.038715] ? mark_held_locks+0xf0/0xf0 [ 831.042784] ? debug_check_no_obj_freed+0x201/0x490 [ 831.047807] ? lock_downgrade+0x720/0x720 [ 831.051959] block_ioctl+0xe9/0x130 [ 831.055581] ? blkdev_fallocate+0x3f0/0x3f0 [ 831.059901] do_vfs_ioctl+0xcdb/0x12e0 [ 831.063789] ? lock_downgrade+0x720/0x720 [ 831.067944] ? check_preemption_disabled+0x41/0x280 [ 831.072974] ? ioctl_preallocate+0x200/0x200 [ 831.077389] ? __fget+0x356/0x510 [ 831.080849] ? do_dup2+0x450/0x450 [ 831.084395] ? do_sys_open+0x2bf/0x520 [ 831.088292] ksys_ioctl+0x9b/0xc0 [ 831.091751] __x64_sys_ioctl+0x6f/0xb0 [ 831.095635] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 831.100201] do_syscall_64+0xf9/0x620 [ 831.103988] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.109166] RIP: 0033:0x7fd12fca3e07 [ 831.112877] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 831.131772] RSP: 002b:00007fd12e618f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 831.139479] RAX: ffffffffffffffda RBX: 00007fd12fced9c8 RCX: 00007fd12fca3e07 [ 831.146732] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 831.153988] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 831.161255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 831.168601] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 [ 831.183647] erofs: read_super, device -> /dev/loop2 [ 831.188982] erofs: options -> noacl,user_xattr, [ 831.197118] erofs: root inode @ nid 36 [ 831.201487] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:47 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) 07:26:47 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x72dfdcd2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:47 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 831.266460] erofs: read_super, device -> /dev/loop1 [ 831.282777] erofs: options -> noacl,user_xattr, [ 831.288802] erofs: unmounted for /dev/loop2 [ 831.296491] erofs: root inode @ nid 36 [ 831.303929] erofs: mounted on /dev/loop1 with opts: noacl. 07:26:47 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 20) 07:26:47 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000950300000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 831.321769] squashfs: SQUASHFS error: unable to read xattr id index table 07:26:47 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000000004000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de", 0x1fe}], 0x0, &(0x7f0000000080)) [ 831.374742] erofs: unmounted for /dev/loop1 [ 831.465949] erofs: read_super, device -> /dev/loop2 [ 831.484123] squashfs: SQUASHFS error: unable to read fragment index table [ 831.486126] erofs: options -> noacl,user_xattr, [ 831.515603] erofs: root inode @ nid 36 07:26:47 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 831.553797] erofs: mounted on /dev/loop2 with opts: noacl. [ 831.566801] squashfs: SQUASHFS error: unable to read xattr id index table 07:26:47 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000960300000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:47 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 831.649403] erofs: unmounted for /dev/loop2 [ 831.657179] FAULT_INJECTION: forcing a failure. [ 831.657179] name failslab, interval 1, probability 0, space 0, times 0 [ 831.676016] CPU: 0 PID: 30383 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 831.683913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 831.693268] Call Trace: [ 831.695863] dump_stack+0x1fc/0x2ef [ 831.699496] should_fail.cold+0xa/0xf [ 831.703305] ? setup_fault_attr+0x200/0x200 [ 831.707630] ? lock_acquire+0x170/0x3c0 [ 831.711611] __should_failslab+0x115/0x180 [ 831.715849] should_failslab+0x5/0x10 [ 831.719649] __kmalloc+0x2ab/0x3c0 [ 831.723190] ? kobject_get_path+0xbf/0x240 [ 831.727431] kobject_get_path+0xbf/0x240 [ 831.731496] kobject_uevent_env+0x25c/0x1480 [ 831.735923] lo_ioctl+0xff9/0x20e0 [ 831.739475] ? loop_set_status64+0x110/0x110 [ 831.743887] blkdev_ioctl+0x5cb/0x1a80 [ 831.747777] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.753142] ? blkpg_ioctl+0x9d0/0x9d0 [ 831.757030] ? mark_held_locks+0xf0/0xf0 [ 831.761089] ? mark_held_locks+0xf0/0xf0 [ 831.765153] ? debug_check_no_obj_freed+0x201/0x490 [ 831.770178] ? lock_downgrade+0x720/0x720 [ 831.774333] block_ioctl+0xe9/0x130 [ 831.777965] ? blkdev_fallocate+0x3f0/0x3f0 [ 831.782285] do_vfs_ioctl+0xcdb/0x12e0 [ 831.786178] ? lock_downgrade+0x720/0x720 [ 831.790332] ? check_preemption_disabled+0x41/0x280 [ 831.795349] ? ioctl_preallocate+0x200/0x200 [ 831.799759] ? __fget+0x356/0x510 [ 831.803216] ? do_dup2+0x450/0x450 [ 831.806757] ? do_sys_open+0x2bf/0x520 [ 831.810659] ksys_ioctl+0x9b/0xc0 [ 831.814117] __x64_sys_ioctl+0x6f/0xb0 [ 831.818003] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 831.822584] do_syscall_64+0xf9/0x620 [ 831.826393] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.831579] RIP: 0033:0x7fd12fca3e07 [ 831.835290] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 831.854187] RSP: 002b:00007fd12e618f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 831.861893] RAX: ffffffffffffffda RBX: 00007fd12fced9c8 RCX: 00007fd12fca3e07 [ 831.869159] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 831.876429] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 831.883696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 831.890962] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 07:26:47 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, 0x0) [ 831.997019] erofs: read_super, device -> /dev/loop1 [ 831.999013] squashfs: SQUASHFS error: unable to read fragment index table 07:26:47 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 832.042562] erofs: options -> noacl,user_xattr, [ 832.060060] erofs: root inode @ nid 36 [ 832.106373] erofs: mounted on /dev/loop1 with opts: noacl. 07:26:47 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000970300000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:47 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e0023f0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:47 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 21) 07:26:48 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, 0x0) [ 832.199441] erofs: read_super, device -> /dev/loop2 [ 832.209238] erofs: unmounted for /dev/loop1 [ 832.215882] erofs: options -> noacl,user_xattr, [ 832.221138] erofs: root inode @ nid 36 [ 832.225292] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:48 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 832.285145] squashfs: SQUASHFS error: unable to read fragment index table [ 832.319943] erofs: unmounted for /dev/loop2 [ 832.325835] FAULT_INJECTION: forcing a failure. [ 832.325835] name failslab, interval 1, probability 0, space 0, times 0 [ 832.339126] CPU: 0 PID: 30420 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 832.347021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 832.356367] Call Trace: [ 832.358962] dump_stack+0x1fc/0x2ef [ 832.362593] should_fail.cold+0xa/0xf [ 832.366404] ? setup_fault_attr+0x200/0x200 [ 832.370735] ? lock_acquire+0x170/0x3c0 [ 832.374718] __should_failslab+0x115/0x180 [ 832.378957] should_failslab+0x5/0x10 [ 832.382750] kmem_cache_alloc_node+0x245/0x3b0 [ 832.387336] __alloc_skb+0x71/0x560 [ 832.390983] alloc_uevent_skb+0x7b/0x210 [ 832.395050] kobject_uevent_env+0xa90/0x1480 [ 832.399456] lo_ioctl+0xff9/0x20e0 [ 832.402996] ? loop_set_status64+0x110/0x110 [ 832.407394] blkdev_ioctl+0x5cb/0x1a80 [ 832.411276] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.416633] ? blkpg_ioctl+0x9d0/0x9d0 [ 832.420514] ? mark_held_locks+0xf0/0xf0 [ 832.424565] ? mark_held_locks+0xf0/0xf0 [ 832.428609] ? debug_check_no_obj_freed+0x201/0x490 [ 832.433607] ? lock_downgrade+0x720/0x720 [ 832.437736] block_ioctl+0xe9/0x130 [ 832.441356] ? blkdev_fallocate+0x3f0/0x3f0 [ 832.445669] do_vfs_ioctl+0xcdb/0x12e0 [ 832.449542] ? lock_downgrade+0x720/0x720 [ 832.453671] ? check_preemption_disabled+0x41/0x280 [ 832.458674] ? ioctl_preallocate+0x200/0x200 [ 832.463082] ? __fget+0x356/0x510 [ 832.466542] ? do_dup2+0x450/0x450 [ 832.470069] ? do_sys_open+0x2bf/0x520 [ 832.473942] ksys_ioctl+0x9b/0xc0 [ 832.477388] __x64_sys_ioctl+0x6f/0xb0 [ 832.481282] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 832.485868] do_syscall_64+0xf9/0x620 [ 832.489656] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.494836] RIP: 0033:0x7fd12fca3e07 [ 832.498559] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 832.517468] RSP: 002b:00007fd12e618f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 832.525167] RAX: ffffffffffffffda RBX: 00007fd12fced9c8 RCX: 00007fd12fca3e07 [ 832.532429] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 832.539687] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 832.546957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 832.554211] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 [ 832.564305] erofs: read_super, device -> /dev/loop5 [ 832.572461] erofs: options -> noacl, [ 832.583198] erofs: root inode @ nid 0 [ 832.587216] erofs: bogus i_mode (0) @ nid 0 07:26:48 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3c0fcf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 832.651816] erofs: read_super, device -> /dev/loop1 [ 832.657441] erofs: options -> noacl,user_xattr, [ 832.665291] erofs: root inode @ nid 36 [ 832.669419] erofs: mounted on /dev/loop1 with opts: noacl. 07:26:48 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040000000000fff06000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:48 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 22) 07:26:48 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000980300000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 832.745221] erofs: read_super, device -> /dev/loop2 [ 832.750304] erofs: options -> noacl,user_xattr, [ 832.757152] erofs: root inode @ nid 36 [ 832.763581] erofs: unmounted for /dev/loop1 [ 832.768035] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:48 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000000004000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, 0x0) 07:26:48 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 832.857355] erofs: unmounted for /dev/loop2 [ 832.864216] erofs: read_super, device -> /dev/loop5 [ 832.869248] erofs: options -> noacl, [ 832.873999] erofs: root inode @ nid 0 [ 832.877839] erofs: bogus i_mode (0) @ nid 0 07:26:48 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f37cf010000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 833.046211] erofs: read_super, device -> /dev/loop2 [ 833.055897] erofs: options -> noacl,user_xattr, [ 833.063273] squashfs: SQUASHFS error: unable to read fragment index table [ 833.067901] erofs: root inode @ nid 36 [ 833.087421] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:48 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) 07:26:48 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000990300000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:48 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000000003000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) [ 833.128285] erofs: unmounted for /dev/loop2 [ 833.147564] FAULT_INJECTION: forcing a failure. [ 833.147564] name failslab, interval 1, probability 0, space 0, times 0 [ 833.159435] CPU: 0 PID: 30469 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 833.167332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 833.176686] Call Trace: [ 833.179278] dump_stack+0x1fc/0x2ef [ 833.182903] should_fail.cold+0xa/0xf [ 833.186691] ? setup_fault_attr+0x200/0x200 [ 833.191116] ? lock_acquire+0x170/0x3c0 [ 833.195088] __should_failslab+0x115/0x180 [ 833.199312] should_failslab+0x5/0x10 [ 833.203100] kmem_cache_alloc_node+0x245/0x3b0 [ 833.207703] __alloc_skb+0x71/0x560 [ 833.211339] alloc_uevent_skb+0x7b/0x210 [ 833.215393] kobject_uevent_env+0xa90/0x1480 [ 833.219797] lo_ioctl+0xff9/0x20e0 [ 833.223325] ? loop_set_status64+0x110/0x110 [ 833.227717] blkdev_ioctl+0x5cb/0x1a80 [ 833.231602] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 833.236957] ? blkpg_ioctl+0x9d0/0x9d0 [ 833.240840] ? mark_held_locks+0xf0/0xf0 [ 833.244891] ? mark_held_locks+0xf0/0xf0 [ 833.248936] ? debug_check_no_obj_freed+0x201/0x490 [ 833.253953] ? lock_downgrade+0x720/0x720 [ 833.258092] block_ioctl+0xe9/0x130 [ 833.261709] ? blkdev_fallocate+0x3f0/0x3f0 [ 833.266021] do_vfs_ioctl+0xcdb/0x12e0 [ 833.269899] ? lock_downgrade+0x720/0x720 [ 833.274047] ? check_preemption_disabled+0x41/0x280 [ 833.279061] ? ioctl_preallocate+0x200/0x200 [ 833.283459] ? __fget+0x356/0x510 [ 833.286895] ? do_dup2+0x450/0x450 [ 833.290427] ? do_sys_open+0x2bf/0x520 [ 833.294325] ksys_ioctl+0x9b/0xc0 [ 833.297773] __x64_sys_ioctl+0x6f/0xb0 [ 833.301659] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 833.306231] do_syscall_64+0xf9/0x620 [ 833.310017] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 833.315187] RIP: 0033:0x7fd12fca3e07 [ 833.318882] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 833.339763] RSP: 002b:00007fd12e618f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 833.347471] RAX: ffffffffffffffda RBX: 00007fd12fced9c8 RCX: 00007fd12fca3e07 [ 833.354723] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 833.361981] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 833.369246] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 833.376512] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 [ 833.474333] erofs: read_super, device -> /dev/loop5 [ 833.480579] erofs: options -> noacl, [ 833.490153] erofs: root inode @ nid 0 [ 833.500674] erofs: read_super, device -> /dev/loop1 [ 833.506057] erofs: options -> noacl,user_xattr, [ 833.513619] erofs: bogus i_mode (0) @ nid 0 07:26:49 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040009a0300000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 833.525395] erofs: root inode @ nid 36 [ 833.529419] erofs: mounted on /dev/loop1 with opts: noacl. 07:26:49 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 833.661258] erofs: read_super, device -> /dev/loop2 [ 833.669976] erofs: options -> noacl,user_xattr, [ 833.678256] erofs: root inode @ nid 36 [ 833.682623] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:49 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000000005000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:49 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000500000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:49 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 23) 07:26:49 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf020000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:49 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 833.777982] erofs: unmounted for /dev/loop2 [ 833.787017] erofs: unmounted for /dev/loop1 [ 833.902506] squashfs: SQUASHFS error: unable to read fragment index table 07:26:49 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:49 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 833.955385] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 833.958093] erofs: read_super, device -> /dev/loop5 [ 833.968162] squashfs: SQUASHFS error: unable to read xattr id index table [ 833.979442] erofs: options -> noacl, [ 833.993669] erofs: root inode @ nid 0 [ 833.997883] erofs: bogus i_mode (0) @ nid 0 [ 834.098142] FAULT_INJECTION: forcing a failure. [ 834.098142] name failslab, interval 1, probability 0, space 0, times 0 [ 834.111299] CPU: 0 PID: 30531 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 834.119201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 834.128545] Call Trace: [ 834.131133] dump_stack+0x1fc/0x2ef [ 834.134764] should_fail.cold+0xa/0xf [ 834.138562] ? setup_fault_attr+0x200/0x200 [ 834.142972] ? lock_acquire+0x170/0x3c0 [ 834.146935] __should_failslab+0x115/0x180 [ 834.151166] should_failslab+0x5/0x10 [ 834.154970] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 834.160065] __kmalloc_node_track_caller+0x38/0x70 [ 834.164978] __alloc_skb+0xae/0x560 [ 834.168630] alloc_uevent_skb+0x7b/0x210 [ 834.172688] kobject_uevent_env+0xa90/0x1480 [ 834.177092] lo_ioctl+0xff9/0x20e0 [ 834.180615] ? loop_set_status64+0x110/0x110 [ 834.185004] blkdev_ioctl+0x5cb/0x1a80 [ 834.188877] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 834.194230] ? blkpg_ioctl+0x9d0/0x9d0 [ 834.198110] ? mark_held_locks+0xf0/0xf0 [ 834.202152] ? mark_held_locks+0xf0/0xf0 [ 834.206204] ? debug_check_no_obj_freed+0x201/0x490 [ 834.211218] ? lock_downgrade+0x720/0x720 [ 834.215370] block_ioctl+0xe9/0x130 [ 834.218990] ? blkdev_fallocate+0x3f0/0x3f0 [ 834.223296] do_vfs_ioctl+0xcdb/0x12e0 [ 834.227166] ? lock_downgrade+0x720/0x720 [ 834.231309] ? check_preemption_disabled+0x41/0x280 [ 834.236325] ? ioctl_preallocate+0x200/0x200 [ 834.240726] ? __fget+0x356/0x510 [ 834.244191] ? do_dup2+0x450/0x450 [ 834.247722] ? do_sys_open+0x2bf/0x520 [ 834.251608] ksys_ioctl+0x9b/0xc0 [ 834.255063] __x64_sys_ioctl+0x6f/0xb0 [ 834.258951] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 834.263526] do_syscall_64+0xf9/0x620 [ 834.267313] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 834.272491] RIP: 0033:0x7fd12fca3e07 [ 834.276202] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 834.295102] RSP: 002b:00007fd12e618f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 834.302810] RAX: ffffffffffffffda RBX: 00007fd12fced9c8 RCX: 00007fd12fca3e07 [ 834.310072] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 834.317329] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 834.324590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 834.331852] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 07:26:50 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000600000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 834.359508] erofs: read_super, device -> /dev/loop1 [ 834.368831] erofs: options -> noacl,user_xattr, [ 834.373454] erofs: read_super, device -> /dev/loop2 [ 834.378584] erofs: root inode @ nid 36 [ 834.378634] erofs: options -> noacl,user_xattr, [ 834.389118] erofs: mounted on /dev/loop1 with opts: noacl. 07:26:50 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 24) 07:26:50 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf030000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 834.409932] squashfs: SQUASHFS error: unable to read fragment index table [ 834.427216] erofs: unmounted for /dev/loop1 [ 834.444715] erofs: root inode @ nid 36 [ 834.453398] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:50 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x23, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 834.529570] FAULT_INJECTION: forcing a failure. [ 834.529570] name failslab, interval 1, probability 0, space 0, times 0 [ 834.542185] CPU: 0 PID: 30550 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 834.550073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 834.559412] Call Trace: [ 834.561994] dump_stack+0x1fc/0x2ef [ 834.565613] should_fail.cold+0xa/0xf [ 834.569396] ? setup_fault_attr+0x200/0x200 [ 834.573716] ? lock_acquire+0x170/0x3c0 [ 834.577672] __should_failslab+0x115/0x180 [ 834.581900] should_failslab+0x5/0x10 [ 834.585704] kmem_cache_alloc+0x277/0x370 [ 834.589834] skb_clone+0x151/0x3d0 [ 834.593375] netlink_broadcast_filtered+0x8e5/0xbc0 [ 834.598377] netlink_broadcast+0x35/0x40 [ 834.602435] kobject_uevent_env+0xa56/0x1480 [ 834.606836] lo_ioctl+0xff9/0x20e0 [ 834.610376] ? loop_set_status64+0x110/0x110 [ 834.614774] blkdev_ioctl+0x5cb/0x1a80 [ 834.618642] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 834.623988] ? blkpg_ioctl+0x9d0/0x9d0 [ 834.627856] ? mark_held_locks+0xf0/0xf0 [ 834.631909] ? mark_held_locks+0xf0/0xf0 [ 834.635958] ? debug_check_no_obj_freed+0x201/0x490 [ 834.640968] ? lock_downgrade+0x720/0x720 [ 834.645103] block_ioctl+0xe9/0x130 [ 834.648720] ? blkdev_fallocate+0x3f0/0x3f0 [ 834.653030] do_vfs_ioctl+0xcdb/0x12e0 [ 834.656910] ? lock_downgrade+0x720/0x720 [ 834.661046] ? check_preemption_disabled+0x41/0x280 [ 834.666049] ? ioctl_preallocate+0x200/0x200 [ 834.670456] ? __fget+0x356/0x510 [ 834.673899] ? do_dup2+0x450/0x450 [ 834.677436] ? do_sys_open+0x2bf/0x520 [ 834.681319] ksys_ioctl+0x9b/0xc0 [ 834.684767] __x64_sys_ioctl+0x6f/0xb0 [ 834.688633] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 834.693204] do_syscall_64+0xf9/0x620 [ 834.696993] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 834.702173] RIP: 0033:0x7fd12fca3e07 [ 834.705877] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 834.724756] RSP: 002b:00007fd12e618f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 834.732455] RAX: ffffffffffffffda RBX: 00007fd12fced9c8 RCX: 00007fd12fca3e07 [ 834.739710] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 834.746960] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 834.754210] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 834.761464] R13: 0000000000000004 R14: 00000000200001c8 R15: 0000000000000003 07:26:50 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 834.786757] squashfs: SQUASHFS error: unable to read fragment index table [ 834.789660] erofs: unmounted for /dev/loop2 [ 834.794530] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 834.808017] squashfs: SQUASHFS error: unable to read xattr id index table [ 834.830493] erofs: read_super, device -> /dev/loop1 [ 834.835525] erofs: options -> noacl,user_xattr, [ 834.848093] erofs: root inode @ nid 36 [ 834.865657] erofs: mounted on /dev/loop1 with opts: noacl. 07:26:50 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 25) [ 834.950906] erofs: read_super, device -> /dev/loop5 [ 834.961731] squashfs: SQUASHFS error: unable to read fragment index table [ 834.969348] erofs: read_super, device -> /dev/loop2 [ 834.983857] erofs: options -> noacl, [ 834.994737] erofs: unmounted for /dev/loop1 07:26:50 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000700000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:50 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 835.000147] erofs: root inode @ nid 0 [ 835.011901] erofs: options -> noacl,user_xattr, [ 835.024922] erofs: bogus i_mode (0) @ nid 0 [ 835.029888] erofs: root inode @ nid 36 07:26:50 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf040000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 835.049878] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:50 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 835.096324] FAULT_INJECTION: forcing a failure. [ 835.096324] name failslab, interval 1, probability 0, space 0, times 0 [ 835.122138] CPU: 0 PID: 30584 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 835.130048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 835.139398] Call Trace: [ 835.141995] dump_stack+0x1fc/0x2ef [ 835.145634] should_fail.cold+0xa/0xf [ 835.149444] ? setup_fault_attr+0x200/0x200 [ 835.153770] ? lock_acquire+0x170/0x3c0 [ 835.157763] __should_failslab+0x115/0x180 [ 835.162004] should_failslab+0x5/0x10 [ 835.163134] erofs: read_super, device -> /dev/loop5 [ 835.165803] kmem_cache_alloc+0x277/0x370 [ 835.165824] getname_flags+0xce/0x590 [ 835.165840] do_mkdirat+0x8d/0x2d0 [ 835.165856] ? __ia32_sys_mknod+0x120/0x120 [ 835.171022] erofs: options -> noacl, [ 835.174995] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 07:26:50 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x60, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 835.175014] ? trace_hardirqs_off_caller+0x6e/0x210 [ 835.175029] ? do_syscall_64+0x21/0x620 [ 835.175045] do_syscall_64+0xf9/0x620 [ 835.179164] erofs: root inode @ nid 0 [ 835.182354] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 835.182367] RIP: 0033:0x7fd12fca3157 [ 835.182380] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 835.182387] RSP: 002b:00007fd12e618f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 835.182399] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca3157 [ 835.182406] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 835.182413] RBP: 00007fd12e619020 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 835.182420] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 835.182428] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 [ 835.187509] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 835.217981] erofs: bogus i_mode (0) @ nid 0 [ 835.230444] squashfs: SQUASHFS error: unable to read xattr id index table [ 835.303888] erofs: unmounted for /dev/loop2 [ 835.313759] squashfs: SQUASHFS error: unable to read fragment index table 07:26:51 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000900000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:51 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 26) 07:26:51 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf070000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:51 executing program 4: syz_mount_image$squashfs(0x0, &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000b00006000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) [ 835.482595] squashfs: SQUASHFS error: unable to read fragment index table 07:26:51 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000000506000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) [ 835.561453] erofs: read_super, device -> /dev/loop2 [ 835.569042] erofs: options -> noacl,user_xattr, [ 835.600320] erofs: root inode @ nid 36 [ 835.604307] erofs: mounted on /dev/loop2 with opts: noacl. [ 835.615880] FAULT_INJECTION: forcing a failure. [ 835.615880] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 835.627705] CPU: 0 PID: 30616 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 835.635585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 835.644934] Call Trace: [ 835.647518] dump_stack+0x1fc/0x2ef [ 835.651143] should_fail.cold+0xa/0xf [ 835.654937] ? setup_fault_attr+0x200/0x200 [ 835.659238] ? wake_up_q+0x93/0xe0 [ 835.662762] ? __mutex_unlock_slowpath+0x2be/0x610 [ 835.667701] __alloc_pages_nodemask+0x239/0x2890 [ 835.672460] ? __lock_acquire+0x6de/0x3ff0 [ 835.676691] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 835.681524] ? blkdev_ioctl+0x11a/0x1a80 [ 835.685587] ? blkpg_ioctl+0x9d0/0x9d0 [ 835.689459] ? retint_kernel+0x2d/0x2d [ 835.693333] cache_grow_begin+0xa4/0x8a0 [ 835.697379] ? setup_fault_attr+0x200/0x200 [ 835.701695] ? lock_acquire+0x170/0x3c0 [ 835.705669] cache_alloc_refill+0x273/0x340 [ 835.709976] kmem_cache_alloc+0x346/0x370 [ 835.714107] getname_flags+0xce/0x590 [ 835.717890] do_mkdirat+0x8d/0x2d0 [ 835.721425] ? __ia32_sys_mknod+0x120/0x120 [ 835.725750] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 835.731110] ? trace_hardirqs_off_caller+0x6e/0x210 [ 835.736117] ? do_syscall_64+0x21/0x620 [ 835.740074] do_syscall_64+0xf9/0x620 [ 835.743872] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 835.749042] RIP: 0033:0x7fd12fca3157 07:26:51 executing program 4: syz_mount_image$squashfs(0x0, &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000b00006000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) [ 835.752745] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 835.771643] RSP: 002b:00007fd12e618f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 835.779340] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca3157 [ 835.786589] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 835.793849] RBP: 00007fd12e619020 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 835.801113] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 835.808380] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 [ 835.855745] erofs: read_super, device -> /dev/loop1 [ 835.862137] erofs: options -> noacl,user_xattr, [ 835.867134] erofs: root inode @ nid 36 [ 835.872935] erofs: mounted on /dev/loop1 with opts: noacl. [ 835.883110] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 835.890509] erofs: read_super, device -> /dev/loop5 07:26:51 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) 07:26:51 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 27) [ 835.907891] erofs: options -> noacl, [ 835.911687] squashfs: SQUASHFS error: unable to read xattr id index table [ 835.927159] erofs: unmounted for /dev/loop2 [ 835.935204] erofs: root inode @ nid 0 [ 835.947968] erofs: bogus i_mode (0) @ nid 0 07:26:51 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000a00000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 835.985712] erofs: unmounted for /dev/loop1 [ 836.004096] squashfs: SQUASHFS error: unable to read fragment index table 07:26:51 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf080000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 836.185217] erofs: read_super, device -> /dev/loop2 07:26:51 executing program 4: syz_mount_image$squashfs(0x0, &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 836.207226] erofs: options -> noacl,user_xattr, [ 836.214700] FAULT_INJECTION: forcing a failure. [ 836.214700] name failslab, interval 1, probability 0, space 0, times 0 [ 836.216416] erofs: root inode @ nid 36 [ 836.244172] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:52 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 836.258720] CPU: 1 PID: 30654 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 836.266618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 836.275965] Call Trace: [ 836.278552] dump_stack+0x1fc/0x2ef [ 836.282175] should_fail.cold+0xa/0xf [ 836.285967] ? setup_fault_attr+0x200/0x200 [ 836.290290] __should_failslab+0x115/0x180 [ 836.294515] should_failslab+0x5/0x10 [ 836.298298] kmem_cache_alloc+0x277/0x370 [ 836.302435] ? ext4_sync_fs+0x8d0/0x8d0 [ 836.306402] ext4_alloc_inode+0x1a/0x630 [ 836.310453] ? ext4_sync_fs+0x8d0/0x8d0 [ 836.314413] alloc_inode+0x5d/0x180 [ 836.318020] new_inode+0x1d/0xf0 [ 836.321380] __ext4_new_inode+0x400/0x5a20 [ 836.325607] ? putname+0xe1/0x120 [ 836.329154] ? do_mkdirat+0xa0/0x2d0 [ 836.332858] ? ext4_free_inode+0x1780/0x1780 [ 836.337252] ? debug_check_no_obj_freed+0x201/0x490 [ 836.342255] ? __dquot_initialize+0x298/0xb70 [ 836.346736] ? lock_acquire+0x170/0x3c0 [ 836.350814] ? dquot_initialize_needed+0x290/0x290 [ 836.355739] ? trace_hardirqs_off+0x64/0x200 [ 836.360147] ? common_perm+0x4be/0x800 [ 836.364049] ext4_mkdir+0x396/0xe10 [ 836.367670] ? putname+0xe1/0x120 [ 836.371106] ? ext4_init_dot_dotdot+0x600/0x600 [ 836.375756] ? generic_permission+0x116/0x4d0 [ 836.380240] ? security_inode_permission+0xc5/0xf0 [ 836.385164] ? inode_permission.part.0+0x10c/0x450 [ 836.390086] vfs_mkdir+0x508/0x7a0 [ 836.393616] do_mkdirat+0x262/0x2d0 [ 836.397232] ? __ia32_sys_mknod+0x120/0x120 [ 836.401547] ? trace_hardirqs_off_caller+0x6e/0x210 [ 836.406555] ? do_syscall_64+0x21/0x620 [ 836.410523] do_syscall_64+0xf9/0x620 [ 836.414322] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 836.419491] RIP: 0033:0x7fd12fca3157 [ 836.423183] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 836.442076] RSP: 002b:00007fd12e618f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 836.449764] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca3157 [ 836.457011] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 836.464259] RBP: 00007fd12e619020 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 836.471514] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 836.478778] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 07:26:52 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x382, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) 07:26:52 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 28) [ 836.539283] erofs: read_super, device -> /dev/loop5 [ 836.541530] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 836.546539] erofs: options -> noacl, [ 836.568892] erofs: unmounted for /dev/loop2 [ 836.605668] squashfs: SQUASHFS error: unable to read xattr id index table [ 836.633595] erofs: root inode @ nid 0 07:26:52 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000001f00000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 836.653925] erofs: bogus i_mode (0) @ nid 0 [ 836.654020] squashfs: SQUASHFS error: unable to read fragment index table [ 836.747844] FAULT_INJECTION: forcing a failure. [ 836.747844] name failslab, interval 1, probability 0, space 0, times 0 [ 836.767467] erofs: read_super, device -> /dev/loop2 [ 836.777061] CPU: 0 PID: 30676 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 836.784955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 07:26:52 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), 0x0, 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:52 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:52 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf140000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 836.789569] erofs: options -> noacl,user_xattr, [ 836.794300] Call Trace: [ 836.794322] dump_stack+0x1fc/0x2ef [ 836.794342] should_fail.cold+0xa/0xf [ 836.794359] ? setup_fault_attr+0x200/0x200 [ 836.794379] __should_failslab+0x115/0x180 [ 836.794397] should_failslab+0x5/0x10 [ 836.794412] kmem_cache_alloc+0x277/0x370 [ 836.794428] ? ext4_sync_fs+0x8d0/0x8d0 [ 836.794443] ext4_alloc_inode+0x1a/0x630 [ 836.794461] ? ext4_sync_fs+0x8d0/0x8d0 [ 836.837474] alloc_inode+0x5d/0x180 [ 836.840738] erofs: root inode @ nid 36 [ 836.841101] new_inode+0x1d/0xf0 [ 836.848332] __ext4_new_inode+0x400/0x5a20 [ 836.848892] erofs: mounted on /dev/loop2 with opts: noacl. [ 836.852569] ? putname+0xe1/0x120 [ 836.852582] ? do_mkdirat+0xa0/0x2d0 [ 836.852610] ? ext4_free_inode+0x1780/0x1780 [ 836.852623] ? debug_check_no_obj_freed+0x201/0x490 [ 836.852638] ? __dquot_initialize+0x298/0xb70 [ 836.852657] ? lock_acquire+0x170/0x3c0 [ 836.852678] ? dquot_initialize_needed+0x290/0x290 [ 836.888101] ? trace_hardirqs_off+0x64/0x200 [ 836.892509] ? common_perm+0x4be/0x800 [ 836.896395] ext4_mkdir+0x396/0xe10 [ 836.900008] ? putname+0xe1/0x120 [ 836.903445] ? ext4_init_dot_dotdot+0x600/0x600 [ 836.908095] ? generic_permission+0x116/0x4d0 [ 836.912572] ? security_inode_permission+0xc5/0xf0 [ 836.917488] ? inode_permission.part.0+0x10c/0x450 [ 836.922414] vfs_mkdir+0x508/0x7a0 [ 836.925949] do_mkdirat+0x262/0x2d0 [ 836.929558] ? __ia32_sys_mknod+0x120/0x120 [ 836.933879] ? trace_hardirqs_off_caller+0x6e/0x210 [ 836.938877] ? do_syscall_64+0x21/0x620 [ 836.942831] do_syscall_64+0xf9/0x620 [ 836.946617] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 836.951785] RIP: 0033:0x7fd12fca3157 [ 836.955477] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 836.974359] RSP: 002b:00007fd12e618f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 836.982061] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca3157 [ 836.989338] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 836.996597] RBP: 00007fd12e619020 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 837.003861] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 837.011117] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 07:26:52 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 29) 07:26:52 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x383, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 837.136511] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 837.147206] erofs: unmounted for /dev/loop2 [ 837.164114] squashfs: SQUASHFS error: unable to read xattr id index table [ 837.224969] squashfs: SQUASHFS error: unable to read fragment index table [ 837.236988] FAULT_INJECTION: forcing a failure. [ 837.236988] name failslab, interval 1, probability 0, space 0, times 0 [ 837.258914] erofs: read_super, device -> /dev/loop2 [ 837.264469] erofs: options -> noacl,user_xattr, [ 837.266865] CPU: 1 PID: 30705 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 837.274203] erofs: root inode @ nid 36 [ 837.277004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 837.277010] Call Trace: [ 837.277032] dump_stack+0x1fc/0x2ef [ 837.277053] should_fail.cold+0xa/0xf [ 837.277072] ? setup_fault_attr+0x200/0x200 [ 837.277089] ? __lock_acquire+0x6de/0x3ff0 [ 837.285332] erofs: mounted on /dev/loop2 with opts: noacl. [ 837.290307] __should_failslab+0x115/0x180 [ 837.290327] should_failslab+0x5/0x10 07:26:53 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000002000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 837.290341] __kmalloc+0x2ab/0x3c0 [ 837.290352] ? ext4_find_extent+0x9bb/0xc70 [ 837.290368] ext4_find_extent+0x9bb/0xc70 [ 837.290391] ext4_ext_map_blocks+0x1c0/0x7390 [ 837.309614] erofs: read_super, device -> /dev/loop5 [ 837.314511] ? __lock_acquire+0x6de/0x3ff0 [ 837.314532] ? __lock_acquire+0x6de/0x3ff0 [ 837.314553] ? mark_held_locks+0xf0/0xf0 [ 837.323530] erofs: options -> noacl, [ 837.326088] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 837.326104] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 837.326121] ? mark_held_locks+0xf0/0xf0 [ 837.326138] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 837.326155] ? ext4_es_lookup_extent+0x375/0xb60 [ 837.334942] erofs: root inode @ nid 0 [ 837.339073] ? lock_downgrade+0x720/0x720 [ 837.339088] ? lock_acquire+0x170/0x3c0 [ 837.339106] ? check_preemption_disabled+0x41/0x280 [ 837.339125] ? lock_acquire+0x170/0x3c0 [ 837.339143] ? ext4_map_blocks+0x33e/0x1a50 [ 837.347141] erofs: bogus i_mode (0) @ nid 0 [ 837.348365] ext4_map_blocks+0xd88/0x1a50 [ 837.348387] ? check_preemption_disabled+0x41/0x280 [ 837.348405] ? ext4_issue_zeroout+0x160/0x160 [ 837.348428] ? __brelse+0x84/0xa0 [ 837.430962] ? __ext4_new_inode+0x2eb/0x5a20 [ 837.435367] ext4_getblk+0xad/0x4f0 [ 837.438999] ? ext4_iomap_begin+0xe00/0xe00 [ 837.443317] ? ext4_free_inode+0x1780/0x1780 [ 837.447706] ? debug_check_no_obj_freed+0x201/0x490 [ 837.452702] ? __dquot_initialize+0x298/0xb70 [ 837.457179] ext4_bread+0x7c/0x210 [ 837.460712] ? ext4_getblk+0x4f0/0x4f0 [ 837.464599] ? dquot_initialize_needed+0x290/0x290 [ 837.469513] ? trace_hardirqs_off+0x64/0x200 [ 837.473906] ext4_append+0x155/0x370 [ 837.477603] ext4_mkdir+0x5bd/0xe10 [ 837.481229] ? ext4_init_dot_dotdot+0x600/0x600 [ 837.485907] ? generic_permission+0x116/0x4d0 [ 837.490391] ? inode_permission.part.0+0x10c/0x450 [ 837.495303] vfs_mkdir+0x508/0x7a0 [ 837.498824] do_mkdirat+0x262/0x2d0 [ 837.502433] ? __ia32_sys_mknod+0x120/0x120 [ 837.506749] ? trace_hardirqs_off_caller+0x6e/0x210 [ 837.511775] ? do_syscall_64+0x21/0x620 [ 837.515735] do_syscall_64+0xf9/0x620 [ 837.519519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 837.524687] RIP: 0033:0x7fd12fca3157 [ 837.528380] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 837.547271] RSP: 002b:00007fd12e618f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 837.554960] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca3157 [ 837.562217] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 837.569466] RBP: 00007fd12e619020 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 837.576720] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 837.583980] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 07:26:53 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3dd, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 837.660974] erofs: unmounted for /dev/loop2 07:26:53 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), 0x0, 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:53 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf250000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:53 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000000806000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) [ 837.691220] erofs: read_super, device -> /dev/loop1 [ 837.697530] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 837.704560] erofs: options -> noacl,user_xattr, [ 837.709529] squashfs: SQUASHFS error: unable to read xattr id index table [ 837.718646] erofs: root inode @ nid 36 [ 837.725432] erofs: mounted on /dev/loop1 with opts: noacl. 07:26:53 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 30) 07:26:53 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000002300000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 837.823449] erofs: unmounted for /dev/loop1 07:26:53 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), 0x0, 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 837.846489] erofs: read_super, device -> /dev/loop5 [ 837.857251] erofs: read_super, device -> /dev/loop2 [ 837.861523] erofs: options -> noacl, [ 837.869269] erofs: options -> noacl,user_xattr, [ 837.881423] erofs: root inode @ nid 36 [ 837.886840] erofs: root inode @ nid 0 [ 837.891250] erofs: mounted on /dev/loop2 with opts: noacl. [ 837.898588] erofs: bogus i_mode (0) @ nid 0 07:26:53 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3de, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 837.952348] erofs: unmounted for /dev/loop2 [ 837.982413] squashfs: SQUASHFS error: unable to read fragment index table [ 838.075615] FAULT_INJECTION: forcing a failure. [ 838.075615] name failslab, interval 1, probability 0, space 0, times 0 [ 838.091434] CPU: 1 PID: 30761 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 838.099332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 838.108682] Call Trace: [ 838.111266] dump_stack+0x1fc/0x2ef [ 838.114879] should_fail.cold+0xa/0xf [ 838.118664] ? setup_fault_attr+0x200/0x200 [ 838.122966] ? lock_downgrade+0x720/0x720 [ 838.127098] __should_failslab+0x115/0x180 [ 838.131313] should_failslab+0x5/0x10 [ 838.135090] __kmalloc+0x2ab/0x3c0 [ 838.138609] ? ext4_find_extent+0x9bb/0xc70 [ 838.142915] ext4_find_extent+0x9bb/0xc70 [ 838.147045] ext4_ext_map_blocks+0x1c0/0x7390 [ 838.151530] ? __lock_acquire+0x6de/0x3ff0 [ 838.155747] ? mark_held_locks+0xf0/0xf0 [ 838.159786] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 838.165131] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 838.170301] ? mark_held_locks+0xf0/0xf0 [ 838.174342] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 838.179167] ? ext4_es_lookup_extent+0x375/0xb60 [ 838.183919] ? ext4_map_blocks+0x59f/0x1a50 [ 838.188230] ? lock_acquire+0x170/0x3c0 [ 838.192184] ? ext4_map_blocks+0x740/0x1a50 [ 838.196488] ext4_map_blocks+0x7a2/0x1a50 [ 838.200620] ? check_preemption_disabled+0x41/0x280 [ 838.205618] ? ext4_issue_zeroout+0x160/0x160 [ 838.210094] ? __brelse+0x84/0xa0 [ 838.213531] ? __ext4_new_inode+0x2eb/0x5a20 [ 838.217924] ext4_getblk+0xad/0x4f0 [ 838.221535] ? ext4_iomap_begin+0xe00/0xe00 [ 838.225857] ? ext4_free_inode+0x1780/0x1780 [ 838.230248] ? debug_check_no_obj_freed+0x201/0x490 [ 838.235244] ? __dquot_initialize+0x298/0xb70 [ 838.239723] ext4_bread+0x7c/0x210 [ 838.243256] ? ext4_getblk+0x4f0/0x4f0 [ 838.247126] ? dquot_initialize_needed+0x290/0x290 [ 838.252037] ? trace_hardirqs_off+0x64/0x200 [ 838.256428] ext4_append+0x155/0x370 [ 838.260131] ext4_mkdir+0x5bd/0xe10 [ 838.263753] ? ext4_init_dot_dotdot+0x600/0x600 [ 838.268405] ? generic_permission+0x116/0x4d0 [ 838.272892] ? inode_permission.part.0+0x10c/0x450 [ 838.277807] vfs_mkdir+0x508/0x7a0 [ 838.281329] do_mkdirat+0x262/0x2d0 [ 838.284938] ? __ia32_sys_mknod+0x120/0x120 [ 838.289243] ? trace_hardirqs_off_caller+0x6e/0x210 [ 838.294248] ? do_syscall_64+0x21/0x620 [ 838.298202] do_syscall_64+0xf9/0x620 [ 838.301989] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 838.307162] RIP: 0033:0x7fd12fca3157 07:26:54 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000004806000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) [ 838.310860] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 838.329739] RSP: 002b:00007fd12e618f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 838.337439] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca3157 [ 838.344709] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 838.351971] RBP: 00007fd12e619020 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 838.359226] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 838.366478] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 07:26:54 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 31) 07:26:54 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:54 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf370000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 838.395677] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 838.455934] squashfs: SQUASHFS error: unable to read xattr id index table 07:26:54 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040008a2600000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 838.522729] erofs: read_super, device -> /dev/loop2 [ 838.536950] erofs: options -> noacl,user_xattr, [ 838.558411] erofs: root inode @ nid 36 [ 838.566798] FAULT_INJECTION: forcing a failure. [ 838.566798] name failslab, interval 1, probability 0, space 0, times 0 [ 838.581327] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 [ 838.582084] erofs: mounted on /dev/loop2 with opts: noacl. [ 838.615386] CPU: 0 PID: 30782 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 838.618692] squashfs: SQUASHFS error: unable to read fragment index table [ 838.623289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 838.623294] Call Trace: [ 838.623316] dump_stack+0x1fc/0x2ef [ 838.623335] should_fail.cold+0xa/0xf [ 838.623352] ? setup_fault_attr+0x200/0x200 [ 838.623368] ? lock_downgrade+0x720/0x720 [ 838.623387] __should_failslab+0x115/0x180 [ 838.623402] should_failslab+0x5/0x10 [ 838.623419] __kmalloc+0x2ab/0x3c0 [ 838.632385] erofs: read_super, device -> /dev/loop5 [ 838.639681] ? ext4_find_extent+0x9bb/0xc70 [ 838.639699] ext4_find_extent+0x9bb/0xc70 [ 838.639721] ext4_ext_map_blocks+0x1c0/0x7390 [ 838.639743] ? __lock_acquire+0x6de/0x3ff0 [ 838.691828] ? mark_held_locks+0xf0/0xf0 [ 838.693533] erofs: options -> noacl, [ 838.695890] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 838.695907] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 838.695923] ? mark_held_locks+0xf0/0xf0 [ 838.695938] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 838.695954] ? ext4_es_lookup_extent+0x375/0xb60 [ 838.704645] erofs: root inode @ nid 0 [ 838.705007] ? ext4_map_blocks+0x59f/0x1a50 [ 838.712260] erofs: bogus i_mode (0) @ nid 0 [ 838.714220] ? lock_acquire+0x170/0x3c0 [ 838.714237] ? ext4_map_blocks+0x740/0x1a50 [ 838.714259] ext4_map_blocks+0x7a2/0x1a50 [ 838.714280] ? check_preemption_disabled+0x41/0x280 [ 838.753550] ? ext4_issue_zeroout+0x160/0x160 [ 838.758040] ? __brelse+0x84/0xa0 [ 838.761474] ? __ext4_new_inode+0x2eb/0x5a20 [ 838.765868] ext4_getblk+0xad/0x4f0 [ 838.769481] ? ext4_iomap_begin+0xe00/0xe00 [ 838.773815] ? ext4_free_inode+0x1780/0x1780 [ 838.778208] ? debug_check_no_obj_freed+0x201/0x490 [ 838.783207] ? __dquot_initialize+0x298/0xb70 [ 838.787687] ext4_bread+0x7c/0x210 [ 838.791230] ? ext4_getblk+0x4f0/0x4f0 [ 838.795105] ? dquot_initialize_needed+0x290/0x290 [ 838.800028] ? trace_hardirqs_off+0x64/0x200 [ 838.804422] ext4_append+0x155/0x370 [ 838.808121] ext4_mkdir+0x5bd/0xe10 [ 838.811733] ? ext4_init_dot_dotdot+0x600/0x600 [ 838.816405] ? generic_permission+0x116/0x4d0 [ 838.820886] ? inode_permission.part.0+0x10c/0x450 [ 838.825809] vfs_mkdir+0x508/0x7a0 [ 838.829340] do_mkdirat+0x262/0x2d0 [ 838.832947] ? __ia32_sys_mknod+0x120/0x120 [ 838.837256] ? trace_hardirqs_off_caller+0x6e/0x210 [ 838.842252] ? do_syscall_64+0x21/0x620 [ 838.846211] do_syscall_64+0xf9/0x620 [ 838.850010] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 838.855186] RIP: 0033:0x7fd12fca3157 [ 838.858888] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 838.877784] RSP: 002b:00007fd12e618f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 838.885475] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca3157 [ 838.892727] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 838.899984] RBP: 00007fd12e619020 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 838.907251] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 838.914511] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 07:26:54 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:54 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3df, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) 07:26:54 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 32) 07:26:54 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 838.988336] erofs: unmounted for /dev/loop2 07:26:54 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf880000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:54 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000b12600000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 839.149506] FAULT_INJECTION: forcing a failure. [ 839.149506] name failslab, interval 1, probability 0, space 0, times 0 [ 839.161179] erofs: read_super, device -> /dev/loop2 [ 839.166037] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 [ 839.166371] erofs: options -> noacl,user_xattr, [ 839.175011] squashfs: SQUASHFS error: unable to read fragment index table [ 839.192775] erofs: root inode @ nid 36 [ 839.197175] CPU: 1 PID: 30810 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 839.203003] erofs: mounted on /dev/loop2 with opts: noacl. [ 839.205055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 839.205061] Call Trace: [ 839.205082] dump_stack+0x1fc/0x2ef [ 839.205102] should_fail.cold+0xa/0xf [ 839.205120] ? setup_fault_attr+0x200/0x200 [ 839.205138] ? lock_downgrade+0x720/0x720 [ 839.238444] __should_failslab+0x115/0x180 [ 839.242762] should_failslab+0x5/0x10 [ 839.246544] __kmalloc+0x2ab/0x3c0 [ 839.250067] ? ext4_find_extent+0x9bb/0xc70 [ 839.254373] ext4_find_extent+0x9bb/0xc70 [ 839.258510] ext4_ext_map_blocks+0x1c0/0x7390 [ 839.262995] ? __lock_acquire+0x6de/0x3ff0 [ 839.267260] ? mark_held_locks+0xf0/0xf0 [ 839.271323] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 839.276667] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 839.281839] ? mark_held_locks+0xf0/0xf0 [ 839.285901] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 839.290830] ? ext4_es_lookup_extent+0x375/0xb60 [ 839.295572] ? ext4_map_blocks+0x59f/0x1a50 [ 839.299878] ? lock_acquire+0x170/0x3c0 [ 839.303846] ? ext4_map_blocks+0x740/0x1a50 [ 839.308159] ext4_map_blocks+0x7a2/0x1a50 [ 839.312313] ? check_preemption_disabled+0x41/0x280 [ 839.317327] ? ext4_issue_zeroout+0x160/0x160 [ 839.321803] ? __brelse+0x84/0xa0 [ 839.325252] ? __ext4_new_inode+0x2eb/0x5a20 [ 839.329659] ext4_getblk+0xad/0x4f0 [ 839.333281] ? ext4_iomap_begin+0xe00/0xe00 [ 839.337593] ? ext4_free_inode+0x1780/0x1780 [ 839.341983] ? debug_check_no_obj_freed+0x201/0x490 [ 839.346997] ? __dquot_initialize+0x298/0xb70 [ 839.351484] ext4_bread+0x7c/0x210 [ 839.355005] ? ext4_getblk+0x4f0/0x4f0 [ 839.358877] ? dquot_initialize_needed+0x290/0x290 [ 839.363898] ? trace_hardirqs_off+0x64/0x200 [ 839.368293] ext4_append+0x155/0x370 [ 839.371993] ext4_mkdir+0x5bd/0xe10 [ 839.375605] ? ext4_init_dot_dotdot+0x600/0x600 [ 839.380266] ? generic_permission+0x116/0x4d0 [ 839.384764] ? inode_permission.part.0+0x10c/0x450 [ 839.389682] vfs_mkdir+0x508/0x7a0 [ 839.393206] do_mkdirat+0x262/0x2d0 [ 839.396817] ? __ia32_sys_mknod+0x120/0x120 [ 839.401123] ? trace_hardirqs_off_caller+0x6e/0x210 [ 839.406120] ? do_syscall_64+0x21/0x620 [ 839.410082] do_syscall_64+0xf9/0x620 [ 839.413881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 839.419052] RIP: 0033:0x7fd12fca3157 [ 839.422748] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 839.441629] RSP: 002b:00007fd12e618f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 07:26:55 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 839.449317] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca3157 [ 839.456586] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 839.463838] RBP: 00007fd12e619020 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 839.471088] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 839.478352] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 07:26:55 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3e0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 839.535891] erofs: unmounted for /dev/loop2 07:26:55 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 33) 07:26:55 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 839.600697] erofs: read_super, device -> /dev/loop5 [ 839.605850] erofs: options -> noacl, [ 839.609834] erofs: root inode @ nid 0 [ 839.614999] erofs: bogus i_mode (0) @ nid 0 07:26:55 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000003f00000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:55 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcfb70300000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 839.684668] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 07:26:55 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x0, 0x0, 0x0, &(0x7f0000000080)) [ 839.772588] FAULT_INJECTION: forcing a failure. [ 839.772588] name failslab, interval 1, probability 0, space 0, times 0 [ 839.783940] CPU: 0 PID: 30846 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 839.791823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 839.801173] Call Trace: [ 839.803770] dump_stack+0x1fc/0x2ef [ 839.807408] should_fail.cold+0xa/0xf [ 839.811218] ? setup_fault_attr+0x200/0x200 [ 839.815550] ? __es_tree_search.isra.0+0x1af/0x210 [ 839.820496] __should_failslab+0x115/0x180 [ 839.824736] should_failslab+0x5/0x10 [ 839.828539] kmem_cache_alloc+0x3f/0x370 [ 839.832609] __es_insert_extent+0x39b/0x13b0 [ 839.837033] ext4_es_insert_extent+0x22e/0x5e0 [ 839.841620] ? ext4_map_blocks+0x59f/0x1a50 [ 839.845950] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 839.851774] ext4_map_blocks+0xa2a/0x1a50 [ 839.855931] ? ext4_issue_zeroout+0x160/0x160 [ 839.860430] ? __brelse+0x84/0xa0 [ 839.861291] squashfs: SQUASHFS error: unable to read fragment index table [ 839.863885] ? __ext4_new_inode+0x2eb/0x5a20 [ 839.873231] erofs: read_super, device -> /dev/loop2 [ 839.875191] ext4_getblk+0xad/0x4f0 [ 839.881253] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 839.883827] ? ext4_iomap_begin+0xe00/0xe00 [ 839.894871] ? ext4_free_inode+0x1780/0x1780 [ 839.899286] ? debug_check_no_obj_freed+0x201/0x490 [ 839.904309] ? __dquot_initialize+0x298/0xb70 [ 839.908811] ext4_bread+0x7c/0x210 [ 839.912355] ? ext4_getblk+0x4f0/0x4f0 [ 839.914085] erofs: read_super, device -> /dev/loop5 [ 839.916246] ? dquot_initialize_needed+0x290/0x290 [ 839.916265] ? trace_hardirqs_off+0x64/0x200 [ 839.916284] ext4_append+0x155/0x370 [ 839.916303] ext4_mkdir+0x5bd/0xe10 [ 839.916325] ? ext4_init_dot_dotdot+0x600/0x600 [ 839.916347] ? generic_permission+0x116/0x4d0 [ 839.926981] erofs: options -> noacl,user_xattr, [ 839.930656] ? inode_permission.part.0+0x10c/0x450 [ 839.930676] vfs_mkdir+0x508/0x7a0 [ 839.930694] do_mkdirat+0x262/0x2d0 [ 839.930710] ? __ia32_sys_mknod+0x120/0x120 [ 839.930728] ? trace_hardirqs_off_caller+0x6e/0x210 [ 839.930741] ? do_syscall_64+0x21/0x620 [ 839.930762] do_syscall_64+0xf9/0x620 [ 839.930780] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 839.930791] RIP: 0033:0x7fd12fca3157 [ 839.930804] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 839.930811] RSP: 002b:00007fd12e618f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 839.930825] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca3157 [ 839.930833] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 839.930841] RBP: 00007fd12e619020 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 839.930850] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 839.930858] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 [ 839.945744] squashfs: SQUASHFS error: unable to read xattr id index table [ 840.016450] erofs: root inode @ nid 36 [ 840.020755] erofs: options -> noacl, [ 840.054875] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:55 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:55 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x0, 0x0, 0x0, &(0x7f0000000080)) 07:26:55 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcfc60300000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 840.095903] erofs: root inode @ nid 0 [ 840.100273] erofs: bogus i_mode (0) @ nid 0 07:26:55 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x0, 0x0, 0x0, &(0x7f0000000080)) [ 840.144155] erofs: read_super, device -> /dev/loop1 [ 840.149646] erofs: options -> noacl,user_xattr, [ 840.155673] erofs: root inode @ nid 36 [ 840.159722] erofs: mounted on /dev/loop1 with opts: noacl. 07:26:55 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3e1, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) 07:26:55 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 34) 07:26:56 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000004000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 840.229818] squashfs: SQUASHFS error: unable to read fragment index table [ 840.237683] erofs: unmounted for /dev/loop2 [ 840.237728] erofs: unmounted for /dev/loop1 07:26:56 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000080)) [ 840.356512] FAULT_INJECTION: forcing a failure. [ 840.356512] name failslab, interval 1, probability 0, space 0, times 0 [ 840.368066] CPU: 1 PID: 30886 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 840.375950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 840.385304] Call Trace: [ 840.387898] dump_stack+0x1fc/0x2ef [ 840.391540] should_fail.cold+0xa/0xf [ 840.395354] ? setup_fault_attr+0x200/0x200 [ 840.399683] ? __es_tree_search.isra.0+0x1af/0x210 [ 840.404622] __should_failslab+0x115/0x180 [ 840.408863] should_failslab+0x5/0x10 [ 840.412667] kmem_cache_alloc+0x3f/0x370 [ 840.416731] __es_insert_extent+0x39b/0x13b0 [ 840.421155] ext4_es_insert_extent+0x22e/0x5e0 [ 840.425749] ? ext4_map_blocks+0x59f/0x1a50 [ 840.430079] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 840.435897] ext4_map_blocks+0xa2a/0x1a50 [ 840.440061] ? ext4_issue_zeroout+0x160/0x160 [ 840.444570] ? __brelse+0x84/0xa0 [ 840.448030] ? __ext4_new_inode+0x2eb/0x5a20 [ 840.452454] ext4_getblk+0xad/0x4f0 [ 840.456095] ? ext4_iomap_begin+0xe00/0xe00 [ 840.460436] ? ext4_free_inode+0x1780/0x1780 [ 840.464849] ? debug_check_no_obj_freed+0x201/0x490 [ 840.469868] ? __dquot_initialize+0x298/0xb70 [ 840.474369] ext4_bread+0x7c/0x210 [ 840.477913] ? ext4_getblk+0x4f0/0x4f0 [ 840.481813] ? dquot_initialize_needed+0x290/0x290 [ 840.486746] ? trace_hardirqs_off+0x64/0x200 [ 840.491159] ext4_append+0x155/0x370 [ 840.494882] ext4_mkdir+0x5bd/0xe10 [ 840.498631] ? ext4_init_dot_dotdot+0x600/0x600 [ 840.503310] ? generic_permission+0x116/0x4d0 [ 840.507813] ? inode_permission.part.0+0x10c/0x450 [ 840.512750] vfs_mkdir+0x508/0x7a0 [ 840.516315] do_mkdirat+0x262/0x2d0 [ 840.519947] ? __ia32_sys_mknod+0x120/0x120 [ 840.524283] ? trace_hardirqs_off_caller+0x6e/0x210 [ 840.529306] ? do_syscall_64+0x21/0x620 [ 840.533289] do_syscall_64+0xf9/0x620 [ 840.537101] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 840.542300] RIP: 0033:0x7fd12fca3157 [ 840.546017] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 840.564916] RSP: 002b:00007fd12e618f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 840.572629] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca3157 [ 840.579898] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 840.587168] RBP: 00007fd12e619020 R08: 0000000000000000 R09: 00007fd12e6191d0 [ 840.594445] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 840.601714] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 [ 840.643209] erofs: read_super, device -> /dev/loop2 [ 840.648738] erofs: options -> noacl,user_xattr, [ 840.655032] erofs: root inode @ nid 36 [ 840.660447] erofs: read_super, device -> /dev/loop1 [ 840.660988] erofs: read_super, device -> /dev/loop5 [ 840.665476] erofs: options -> noacl,user_xattr, [ 840.675724] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 [ 840.681036] SQUASHFS error: squashfs_read_data failed to read block 0x0 07:26:56 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000006c06000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) [ 840.703556] squashfs: SQUASHFS error: unable to read xattr id index table [ 840.722483] erofs: mounted on /dev/loop2 with opts: noacl. [ 840.728686] erofs: root inode @ nid 36 [ 840.729921] erofs: options -> noacl, [ 840.738329] erofs: mounted on /dev/loop1 with opts: noacl. [ 840.742312] erofs: root inode @ nid 0 07:26:56 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000004800000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 840.754251] erofs: bogus i_mode (0) @ nid 0 07:26:56 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 35) 07:26:56 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3e2, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) 07:26:56 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000080)) [ 840.808610] erofs: unmounted for /dev/loop1 [ 840.813803] erofs: unmounted for /dev/loop2 07:26:56 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf020400000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 840.881225] squashfs: SQUASHFS error: unable to read fragment index table 07:26:56 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 840.929681] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 840.957713] squashfs: SQUASHFS error: unable to read xattr id index table 07:26:56 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000004c00000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 841.006233] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 07:26:56 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000080)) [ 841.130256] erofs: read_super, device -> /dev/loop5 [ 841.140937] erofs: read_super, device -> /dev/loop2 [ 841.141871] erofs: options -> noacl, [ 841.162543] erofs: options -> noacl,user_xattr, [ 841.176066] erofs: root inode @ nid 0 [ 841.187931] FAULT_INJECTION: forcing a failure. [ 841.187931] name failslab, interval 1, probability 0, space 0, times 0 [ 841.189265] erofs: bogus i_mode (0) @ nid 0 [ 841.202123] squashfs: SQUASHFS error: unable to read fragment index table [ 841.216826] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 841.224150] erofs: root inode @ nid 36 [ 841.241390] squashfs: SQUASHFS error: unable to read xattr id index table [ 841.255142] erofs: mounted on /dev/loop2 with opts: noacl. [ 841.272420] CPU: 0 PID: 30935 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 841.280324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 841.289670] Call Trace: [ 841.292255] dump_stack+0x1fc/0x2ef [ 841.295880] should_fail.cold+0xa/0xf [ 841.299667] ? setup_fault_attr+0x200/0x200 [ 841.303981] ? lock_acquire+0x170/0x3c0 [ 841.307964] __should_failslab+0x115/0x180 [ 841.312204] should_failslab+0x5/0x10 [ 841.316006] __kmalloc_track_caller+0x2a6/0x3c0 [ 841.320685] ? strndup_user+0x70/0x120 [ 841.324573] ? _copy_from_user+0xd2/0x130 [ 841.328722] memdup_user+0x22/0xb0 [ 841.332255] strndup_user+0x70/0x120 [ 841.335960] ksys_mount+0x6f/0x130 [ 841.339487] __x64_sys_mount+0xba/0x150 [ 841.343451] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 841.348022] do_syscall_64+0xf9/0x620 [ 841.351816] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 841.356990] RIP: 0033:0x7fd12fca557a [ 841.360690] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 841.379577] RSP: 002b:00007fd12e618f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 07:26:57 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000006000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 841.387267] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca557a [ 841.394519] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fd12e618fe0 [ 841.401770] RBP: 00007fd12e619020 R08: 00007fd12e619020 R09: 0000000020000000 [ 841.409024] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 841.416279] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 07:26:57 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:57 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3e3, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) 07:26:57 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 36) 07:26:57 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf006e00000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 841.551593] erofs: unmounted for /dev/loop2 [ 841.556183] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 07:26:57 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000000080)) [ 841.686009] FAULT_INJECTION: forcing a failure. [ 841.686009] name failslab, interval 1, probability 0, space 0, times 0 [ 841.697543] CPU: 1 PID: 30964 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 841.705431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 841.710486] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 841.714787] Call Trace: [ 841.724118] dump_stack+0x1fc/0x2ef [ 841.727757] should_fail.cold+0xa/0xf [ 841.731573] ? setup_fault_attr+0x200/0x200 [ 841.735904] ? lock_acquire+0x170/0x3c0 [ 841.739408] erofs: read_super, device -> /dev/loop5 [ 841.739885] __should_failslab+0x115/0x180 [ 841.739903] should_failslab+0x5/0x10 [ 841.739919] kmem_cache_alloc+0x277/0x370 [ 841.746965] erofs: read_super, device -> /dev/loop2 [ 841.749142] alloc_vfsmnt+0x23/0x780 [ 841.749159] ? _raw_read_unlock+0x29/0x40 [ 841.749175] vfs_kern_mount.part.0+0x27/0x470 [ 841.754301] squashfs: SQUASHFS error: unable to read fragment index table [ 841.757105] do_mount+0x115c/0x2f50 [ 841.757122] ? cmp_ex_sort+0xc0/0xc0 [ 841.757141] ? __do_page_fault+0x180/0xd60 [ 841.762229] erofs: options -> noacl, [ 841.765840] ? copy_mount_string+0x40/0x40 [ 841.765863] ? memset+0x20/0x40 [ 841.765880] ? copy_mount_options+0x26f/0x380 [ 841.781955] erofs: options -> noacl,user_xattr, [ 841.785022] ksys_mount+0xcf/0x130 [ 841.785041] __x64_sys_mount+0xba/0x150 [ 841.785056] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 841.785071] do_syscall_64+0xf9/0x620 [ 841.785091] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 841.785102] RIP: 0033:0x7fd12fca557a [ 841.785113] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 841.785121] RSP: 002b:00007fd12e618f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 841.785134] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca557a [ 841.785142] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fd12e618fe0 [ 841.785150] RBP: 00007fd12e619020 R08: 00007fd12e619020 R09: 0000000020000000 [ 841.785158] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 841.785167] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 [ 841.801192] squashfs: SQUASHFS error: unable to read xattr id index table [ 841.828980] erofs: root inode @ nid 36 [ 841.876336] erofs: root inode @ nid 0 [ 841.881893] erofs: mounted on /dev/loop2 with opts: noacl. [ 841.889043] erofs: bogus i_mode (0) @ nid 0 07:26:57 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf006f00000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:57 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 37) 07:26:57 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3e4, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) 07:26:57 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:57 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000006800000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 842.006627] erofs: unmounted for /dev/loop2 [ 842.022187] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 07:26:57 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000000080)) [ 842.184147] FAULT_INJECTION: forcing a failure. [ 842.184147] name failslab, interval 1, probability 0, space 0, times 0 [ 842.191397] squashfs: SQUASHFS error: unable to read fragment index table [ 842.195860] CPU: 0 PID: 31000 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 842.210358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 842.219715] Call Trace: [ 842.222313] dump_stack+0x1fc/0x2ef [ 842.225955] should_fail.cold+0xa/0xf [ 842.229768] ? setup_fault_attr+0x200/0x200 [ 842.234095] ? lock_acquire+0x170/0x3c0 [ 842.238082] __should_failslab+0x115/0x180 [ 842.242327] should_failslab+0x5/0x10 [ 842.246133] kmem_cache_alloc+0x277/0x370 [ 842.250290] getname_flags+0xce/0x590 [ 842.254099] user_path_at_empty+0x2a/0x50 [ 842.258260] do_mount+0x147/0x2f50 [ 842.261812] ? cmp_ex_sort+0xc0/0xc0 [ 842.265534] ? __do_page_fault+0x180/0xd60 [ 842.269781] ? copy_mount_string+0x40/0x40 [ 842.274032] ? memset+0x20/0x40 [ 842.277317] ? copy_mount_options+0x26f/0x380 [ 842.281819] ksys_mount+0xcf/0x130 [ 842.285367] __x64_sys_mount+0xba/0x150 [ 842.289350] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 842.294025] do_syscall_64+0xf9/0x620 [ 842.297855] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 842.303045] RIP: 0033:0x7fd12fca557a [ 842.306763] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 842.325749] RSP: 002b:00007fd12e618f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 07:26:58 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 842.333462] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca557a [ 842.340722] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fd12e618fe0 [ 842.347983] RBP: 00007fd12e619020 R08: 00007fd12e619020 R09: 0000000020000000 [ 842.355244] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 842.362497] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 07:26:58 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000000080)) [ 842.426829] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 [ 842.427663] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 842.453133] squashfs: SQUASHFS error: unable to read xattr id index table [ 842.476990] erofs: read_super, device -> /dev/loop5 [ 842.484561] erofs: options -> noacl, [ 842.488831] erofs: root inode @ nid 0 [ 842.494455] erofs: bogus i_mode (0) @ nid 0 07:26:58 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 38) 07:26:58 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000006c00000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 842.521307] erofs: read_super, device -> /dev/loop2 [ 842.526345] erofs: options -> noacl,user_xattr, [ 842.550632] erofs: root inode @ nid 36 [ 842.554708] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:58 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcfd9dcdf720c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:26:58 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3e5, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 842.588533] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 [ 842.598636] erofs: unmounted for /dev/loop2 [ 842.617336] squashfs: SQUASHFS error: unable to read fragment index table [ 842.649927] Bluetooth: hci2: command 0x0406 tx timeout 07:26:58 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)}], 0x0, &(0x7f0000000080)) 07:26:58 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 842.765124] FAULT_INJECTION: forcing a failure. [ 842.765124] name failslab, interval 1, probability 0, space 0, times 0 [ 842.780589] CPU: 1 PID: 31045 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 842.788609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 842.797964] Call Trace: [ 842.800543] dump_stack+0x1fc/0x2ef [ 842.804156] should_fail.cold+0xa/0xf [ 842.807943] ? setup_fault_attr+0x200/0x200 [ 842.812259] ? lock_acquire+0x170/0x3c0 [ 842.816245] __should_failslab+0x115/0x180 [ 842.820491] should_failslab+0x5/0x10 [ 842.824296] kmem_cache_alloc+0x277/0x370 [ 842.827952] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 842.828449] getname_flags+0xce/0x590 [ 842.828466] user_path_at_empty+0x2a/0x50 [ 842.843131] do_mount+0x147/0x2f50 [ 842.844396] squashfs: SQUASHFS error: unable to read xattr id index table [ 842.846681] ? cmp_ex_sort+0xc0/0xc0 [ 842.846700] ? __do_page_fault+0x180/0xd60 [ 842.846718] ? copy_mount_string+0x40/0x40 [ 842.846742] ? memset+0x20/0x40 [ 842.846760] ? copy_mount_options+0x26f/0x380 [ 842.873562] ksys_mount+0xcf/0x130 [ 842.877117] __x64_sys_mount+0xba/0x150 [ 842.881103] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 842.885690] do_syscall_64+0xf9/0x620 [ 842.889499] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 842.894692] RIP: 0033:0x7fd12fca557a [ 842.898414] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 842.917308] RSP: 002b:00007fd12e618f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 842.924998] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca557a [ 842.932248] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fd12e618fe0 [ 842.939498] RBP: 00007fd12e619020 R08: 00007fd12e619020 R09: 0000000020000000 [ 842.946764] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 842.954031] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 07:26:58 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000007400000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 842.980566] erofs: read_super, device -> /dev/loop5 [ 842.992843] erofs: options -> noacl, [ 842.996845] erofs: root inode @ nid 0 [ 843.001145] erofs: bogus i_mode (0) @ nid 0 07:26:58 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 843.038048] erofs: read_super, device -> /dev/loop2 [ 843.051489] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 843.057278] erofs: options -> noacl,user_xattr, [ 843.067251] erofs: root inode @ nid 36 [ 843.078442] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:58 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3e6, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) 07:26:58 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 39) 07:26:58 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcfdfdcdf720c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 843.152665] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 [ 843.173507] SQUASHFS error: squashfs_read_data failed to read block 0x0 07:26:58 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)}], 0x0, &(0x7f0000000080)) [ 843.199164] squashfs: SQUASHFS error: unable to read xattr id index table [ 843.208873] erofs: unmounted for /dev/loop2 [ 843.277039] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 843.314990] FAULT_INJECTION: forcing a failure. [ 843.314990] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 843.326820] CPU: 0 PID: 31088 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 843.329009] erofs: read_super, device -> /dev/loop5 [ 843.334700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.334707] Call Trace: [ 843.334728] dump_stack+0x1fc/0x2ef [ 843.334751] should_fail.cold+0xa/0xf [ 843.334770] ? setup_fault_attr+0x200/0x200 [ 843.334783] ? is_bpf_text_address+0xfc/0x1b0 [ 843.334800] ? kernel_text_address+0xbd/0xf0 [ 843.334815] ? __kernel_text_address+0x9/0x30 [ 843.334838] __alloc_pages_nodemask+0x239/0x2890 [ 843.356056] erofs: options -> noacl, [ 843.359257] ? __lock_acquire+0x6de/0x3ff0 [ 843.359280] ? __x64_sys_mount+0xba/0x150 [ 843.359294] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 843.359309] ? ext4_mkdir+0x82b/0xe10 [ 843.389215] erofs: root inode @ nid 0 [ 843.389610] ? mark_held_locks+0xf0/0xf0 [ 843.404718] erofs: bogus i_mode (0) @ nid 0 [ 843.406129] ? mark_held_locks+0xf0/0xf0 [ 843.406151] ? list_lru_add+0x292/0x600 [ 843.406175] ? mntput_no_expire+0xf2/0xa30 [ 843.420370] erofs: read_super, device -> /dev/loop2 [ 843.422526] cache_grow_begin+0xa4/0x8a0 [ 843.422544] ? setup_fault_attr+0x200/0x200 [ 843.422560] ? lock_acquire+0x170/0x3c0 [ 843.422576] cache_alloc_refill+0x273/0x340 [ 843.422594] kmem_cache_alloc_trace+0x354/0x380 [ 843.422614] copy_mount_options+0x59/0x380 [ 843.422632] ksys_mount+0x9b/0x130 [ 843.422646] __x64_sys_mount+0xba/0x150 [ 843.422661] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 843.422675] do_syscall_64+0xf9/0x620 [ 843.422695] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 843.422706] RIP: 0033:0x7fd12fca557a [ 843.422719] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 843.422726] RSP: 002b:00007fd12e618f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 843.422739] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca557a [ 843.422748] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fd12e618fe0 [ 843.422755] RBP: 00007fd12e619020 R08: 00007fd12e619020 R09: 0000000020000000 [ 843.422763] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 843.422771] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 [ 843.546315] erofs: options -> noacl,user_xattr, [ 843.551558] erofs: root inode @ nid 36 [ 843.555672] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:59 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:26:59 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) 07:26:59 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000007a00000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:59 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)}], 0x0, &(0x7f0000000080)) 07:26:59 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf1fffffff0c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 843.579762] erofs: read_super, device -> /dev/loop1 [ 843.584797] erofs: options -> noacl,user_xattr, [ 843.589508] erofs: root inode @ nid 36 [ 843.594552] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 [ 843.614139] erofs: unmounted for /dev/loop2 07:26:59 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 40) [ 843.662334] erofs: mounted on /dev/loop1 with opts: noacl. [ 843.697507] erofs: unmounted for /dev/loop1 [ 843.789460] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 [ 843.801729] erofs: read_super, device -> /dev/loop2 [ 843.804512] erofs: read_super, device -> /dev/loop5 [ 843.806745] erofs: options -> noacl,user_xattr, [ 843.806800] erofs: root inode @ nid 36 [ 843.821535] erofs: options -> noacl, [ 843.832309] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 843.839017] FAULT_INJECTION: forcing a failure. [ 843.839017] name failslab, interval 1, probability 0, space 0, times 0 [ 843.854720] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 843.858309] erofs: root inode @ nid 0 [ 843.864219] squashfs: SQUASHFS error: unable to read xattr id index table [ 843.871375] CPU: 1 PID: 31137 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 843.880144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.889483] Call Trace: [ 843.892062] dump_stack+0x1fc/0x2ef [ 843.895681] should_fail.cold+0xa/0xf [ 843.899472] ? setup_fault_attr+0x200/0x200 [ 843.903777] ? lock_acquire+0x170/0x3c0 [ 843.907752] __should_failslab+0x115/0x180 [ 843.911977] should_failslab+0x5/0x10 [ 843.915769] kmem_cache_alloc+0x277/0x370 [ 843.919994] alloc_vfsmnt+0x23/0x780 [ 843.923691] ? _raw_read_unlock+0x29/0x40 [ 843.927831] vfs_kern_mount.part.0+0x27/0x470 [ 843.932317] do_mount+0x115c/0x2f50 [ 843.935943] ? cmp_ex_sort+0xc0/0xc0 [ 843.939650] ? __do_page_fault+0x180/0xd60 [ 843.943874] ? copy_mount_string+0x40/0x40 [ 843.948099] ? memset+0x20/0x40 [ 843.951367] ? copy_mount_options+0x26f/0x380 [ 843.955859] ksys_mount+0xcf/0x130 [ 843.959387] __x64_sys_mount+0xba/0x150 [ 843.963349] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 843.967914] do_syscall_64+0xf9/0x620 [ 843.971703] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 843.976877] RIP: 0033:0x7fd12fca557a [ 843.980577] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 843.999460] RSP: 002b:00007fd12e618f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 844.007150] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca557a [ 844.014402] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fd12e618fe0 [ 844.021657] RBP: 00007fd12e619020 R08: 00007fd12e619020 R09: 0000000020000000 [ 844.028909] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 844.036158] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 [ 844.044706] erofs: bogus i_mode (0) @ nid 0 [ 844.049486] erofs: mounted on /dev/loop2 with opts: noacl. 07:26:59 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x100}], 0x0, &(0x7f0000000080)) 07:26:59 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000038200000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:26:59 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) 07:26:59 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 844.169891] erofs: unmounted for /dev/loop2 07:26:59 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010200000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:27:00 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 41) 07:27:00 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000268a00000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 844.325046] squashfs: SQUASHFS error: unable to read xattr id index table [ 844.390629] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 844.406872] FAULT_INJECTION: forcing a failure. [ 844.406872] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 844.419056] CPU: 0 PID: 31169 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 844.426947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 07:27:00 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x100}], 0x0, &(0x7f0000000080)) [ 844.436266] erofs: read_super, device -> /dev/loop2 [ 844.436300] Call Trace: [ 844.443888] dump_stack+0x1fc/0x2ef [ 844.447534] should_fail.cold+0xa/0xf [ 844.451342] ? lock_acquire+0x170/0x3c0 [ 844.455330] ? setup_fault_attr+0x200/0x200 [ 844.459668] __alloc_pages_nodemask+0x239/0x2890 [ 844.460323] erofs: options -> noacl,user_xattr, [ 844.464546] ? lock_acquire+0x170/0x3c0 [ 844.464563] ? pcpu_alloc+0x91f/0x1190 [ 844.464580] ? mark_held_locks+0xf0/0xf0 [ 844.464596] ? pcpu_alloc+0xe78/0x1190 [ 844.464618] ? gfp_pfmemalloc_allowed+0x150/0x150 07:27:00 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 844.482500] erofs: root inode @ nid 36 [ 844.485052] ? check_preemption_disabled+0x41/0x280 [ 844.485076] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 844.485092] ? pcpu_alloc+0xc9/0x1190 [ 844.485114] alloc_pages_current+0x193/0x2a0 [ 844.502271] erofs: mounted on /dev/loop2 with opts: noacl. [ 844.503810] ? __lockdep_init_map+0x100/0x5a0 [ 844.503830] get_zeroed_page+0x10/0x40 [ 844.503843] mount_fs+0x203/0x310 [ 844.503864] vfs_kern_mount.part.0+0x68/0x470 [ 844.503883] do_mount+0x115c/0x2f50 [ 844.533536] squashfs: SQUASHFS error: unable to read xattr id index table [ 844.533945] ? cmp_ex_sort+0xc0/0xc0 [ 844.548152] ? __do_page_fault+0x180/0xd60 [ 844.552376] ? copy_mount_string+0x40/0x40 [ 844.556598] ? memset+0x20/0x40 [ 844.559862] ? copy_mount_options+0x26f/0x380 [ 844.564341] ksys_mount+0xcf/0x130 [ 844.567865] __x64_sys_mount+0xba/0x150 [ 844.571833] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 844.576416] do_syscall_64+0xf9/0x620 [ 844.580215] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 844.585385] RIP: 0033:0x7fd12fca557a [ 844.589092] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 844.607994] RSP: 002b:00007fd12e618f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 844.615701] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca557a [ 844.622969] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fd12e618fe0 [ 844.630231] RBP: 00007fd12e619020 R08: 00007fd12e619020 R09: 0000000020000000 [ 844.637504] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 844.644753] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 [ 844.652401] erofs: unmounted for /dev/loop2 07:27:00 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f00400000000000004c000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) 07:27:00 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010300000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 844.709913] erofs: read_super, device -> /dev/loop5 [ 844.714961] erofs: options -> noacl, [ 844.718727] erofs: root inode @ nid 0 [ 844.723089] erofs: bogus i_mode (0) @ nid 0 07:27:00 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 42) 07:27:00 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000b00006000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00", 0x100}], 0x0, &(0x7f0000000080)) 07:27:00 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000038f00000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 844.882788] erofs: read_super, device -> /dev/loop2 [ 844.885413] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 844.899011] erofs: options -> noacl,user_xattr, [ 844.939170] erofs: root inode @ nid 36 07:27:00 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 844.964295] erofs: mounted on /dev/loop2 with opts: noacl. 07:27:00 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x900, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 845.031930] FAULT_INJECTION: forcing a failure. [ 845.031930] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 845.055688] CPU: 0 PID: 31207 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 845.063599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.072953] Call Trace: [ 845.075548] dump_stack+0x1fc/0x2ef [ 845.079186] should_fail.cold+0xa/0xf [ 845.082995] ? lock_acquire+0x170/0x3c0 [ 845.086976] ? setup_fault_attr+0x200/0x200 [ 845.091316] __alloc_pages_nodemask+0x239/0x2890 [ 845.096078] ? lock_acquire+0x170/0x3c0 [ 845.100061] ? pcpu_alloc+0x91f/0x1190 [ 845.103955] ? mark_held_locks+0xf0/0xf0 [ 845.108023] ? pcpu_alloc+0xe78/0x1190 [ 845.111932] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 845.116800] ? check_preemption_disabled+0x41/0x280 [ 845.121825] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 845.126845] ? pcpu_alloc+0xc9/0x1190 [ 845.130658] alloc_pages_current+0x193/0x2a0 [ 845.135074] ? __lockdep_init_map+0x100/0x5a0 [ 845.139426] erofs: read_super, device -> /dev/loop5 [ 845.139570] get_zeroed_page+0x10/0x40 [ 845.139584] mount_fs+0x203/0x310 [ 845.139603] vfs_kern_mount.part.0+0x68/0x470 [ 845.139620] do_mount+0x115c/0x2f50 [ 845.139636] ? cmp_ex_sort+0xc0/0xc0 [ 845.139655] ? __do_page_fault+0x180/0xd60 [ 845.144997] erofs: options -> noacl, [ 845.148531] ? copy_mount_string+0x40/0x40 [ 845.148556] ? memset+0x20/0x40 [ 845.148573] ? copy_mount_options+0x26f/0x380 [ 845.148591] ksys_mount+0xcf/0x130 [ 845.148608] __x64_sys_mount+0xba/0x150 [ 845.191180] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 845.192999] erofs: root inode @ nid 0 [ 845.195766] do_syscall_64+0xf9/0x620 [ 845.195789] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 845.195802] RIP: 0033:0x7fd12fca557a [ 845.195817] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 845.195823] RSP: 002b:00007fd12e618f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 845.223203] erofs: bogus i_mode (0) @ nid 0 [ 845.231236] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca557a [ 845.231246] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fd12e618fe0 [ 845.231255] RBP: 00007fd12e619020 R08: 00007fd12e619020 R09: 0000000020000000 [ 845.231263] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 845.231272] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 [ 845.280654] erofs: unmounted for /dev/loop2 07:27:01 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010400000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:27:01 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x180}], 0x0, &(0x7f0000000080)) 07:27:01 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000039000000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 845.341645] squashfs: SQUASHFS error: unable to read xattr id index table 07:27:01 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 43) [ 845.411637] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 845.449196] erofs: read_super, device -> /dev/loop2 07:27:01 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 845.465744] erofs: options -> noacl,user_xattr, [ 845.472452] erofs: root inode @ nid 36 [ 845.476572] erofs: mounted on /dev/loop2 with opts: noacl. 07:27:01 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 845.593224] erofs: unmounted for /dev/loop2 [ 845.639243] FAULT_INJECTION: forcing a failure. [ 845.639243] name failslab, interval 1, probability 0, space 0, times 0 [ 845.652761] erofs: read_super, device -> /dev/loop5 [ 845.664573] erofs: options -> noacl, [ 845.671743] CPU: 1 PID: 31243 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 845.679639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.689000] Call Trace: [ 845.691594] dump_stack+0x1fc/0x2ef [ 845.693381] erofs: root inode @ nid 0 [ 845.695228] should_fail.cold+0xa/0xf [ 845.699297] erofs: bogus i_mode (0) @ nid 0 [ 845.702800] ? setup_fault_attr+0x200/0x200 [ 845.702816] ? lock_acquire+0x170/0x3c0 [ 845.702836] __should_failslab+0x115/0x180 [ 845.702853] should_failslab+0x5/0x10 [ 845.702866] kmem_cache_alloc+0x277/0x370 [ 845.702884] getname_kernel+0x4e/0x370 [ 845.731420] kern_path+0x1b/0x40 [ 845.734770] lookup_bdev+0xfc/0x220 [ 845.738403] ? bd_acquire+0x440/0x440 [ 845.742196] blkdev_get_by_path+0x1b/0xd0 [ 845.746335] mount_bdev+0x5b/0x3b0 [ 845.749946] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 845.755222] erofs_mount+0x8c/0xc0 [ 845.758756] ? erofs_kill_sb+0x20/0x20 [ 845.762636] ? alloc_pages_current+0x19b/0x2a0 [ 845.767213] ? __lockdep_init_map+0x100/0x5a0 [ 845.771709] mount_fs+0xa3/0x310 [ 845.775078] vfs_kern_mount.part.0+0x68/0x470 [ 845.779594] do_mount+0x115c/0x2f50 [ 845.783218] ? cmp_ex_sort+0xc0/0xc0 [ 845.786916] ? __do_page_fault+0x180/0xd60 [ 845.791134] ? copy_mount_string+0x40/0x40 [ 845.795358] ? memset+0x20/0x40 [ 845.798629] ? copy_mount_options+0x26f/0x380 [ 845.803131] ksys_mount+0xcf/0x130 [ 845.806743] __x64_sys_mount+0xba/0x150 [ 845.810714] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 845.815407] do_syscall_64+0xf9/0x620 [ 845.819202] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 845.824373] RIP: 0033:0x7fd12fca557a [ 845.828068] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 845.846961] RSP: 002b:00007fd12e618f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 845.854649] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca557a [ 845.861909] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fd12e618fe0 [ 845.869164] RBP: 00007fd12e619020 R08: 00007fd12e619020 R09: 0000000020000000 [ 845.876417] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 845.883668] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 07:27:01 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010500000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:27:01 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000039100000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 845.995475] squashfs: SQUASHFS error: unable to read xattr id index table 07:27:01 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 44) 07:27:01 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x180}], 0x0, &(0x7f0000000080)) [ 846.041019] erofs: read_super, device -> /dev/loop2 [ 846.046470] squashfs: SQUASHFS error: Filesystem uses "lzma" compression. This is not supported [ 846.061632] erofs: options -> noacl,user_xattr, [ 846.068288] erofs: root inode @ nid 36 [ 846.072995] erofs: mounted on /dev/loop2 with opts: noacl. 07:27:01 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000000003000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) 07:27:01 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2300, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) 07:27:01 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000039200000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 846.184146] erofs: unmounted for /dev/loop2 [ 846.195745] FAULT_INJECTION: forcing a failure. [ 846.195745] name failslab, interval 1, probability 0, space 0, times 0 [ 846.207663] CPU: 0 PID: 31276 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 846.215639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 846.224991] Call Trace: [ 846.227587] dump_stack+0x1fc/0x2ef [ 846.231234] should_fail.cold+0xa/0xf [ 846.235044] ? setup_fault_attr+0x200/0x200 [ 846.239375] ? lock_acquire+0x170/0x3c0 [ 846.243373] __should_failslab+0x115/0x180 [ 846.247617] should_failslab+0x5/0x10 [ 846.251422] kmem_cache_alloc_trace+0x284/0x380 [ 846.256100] ? set_bdev_super+0x110/0x110 [ 846.260251] ? ns_test_super+0x50/0x50 [ 846.264145] sget_userns+0x122/0xcd0 [ 846.267861] ? set_bdev_super+0x110/0x110 [ 846.272019] ? ns_test_super+0x50/0x50 [ 846.275923] ? set_bdev_super+0x110/0x110 [ 846.280072] ? ns_test_super+0x50/0x50 [ 846.283954] sget+0x102/0x140 [ 846.287043] mount_bdev+0xf8/0x3b0 [ 846.290578] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 846.295865] erofs_mount+0x8c/0xc0 [ 846.299390] ? erofs_kill_sb+0x20/0x20 [ 846.303267] ? alloc_pages_current+0x19b/0x2a0 [ 846.307834] ? __lockdep_init_map+0x100/0x5a0 [ 846.312324] mount_fs+0xa3/0x310 [ 846.315685] vfs_kern_mount.part.0+0x68/0x470 [ 846.320181] do_mount+0x115c/0x2f50 [ 846.323802] ? cmp_ex_sort+0xc0/0xc0 [ 846.327507] ? __do_page_fault+0x180/0xd60 [ 846.331746] ? copy_mount_string+0x40/0x40 [ 846.335973] ? memset+0x20/0x40 [ 846.339234] ? copy_mount_options+0x26f/0x380 [ 846.343714] ksys_mount+0xcf/0x130 [ 846.347253] __x64_sys_mount+0xba/0x150 [ 846.351235] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 846.355808] do_syscall_64+0xf9/0x620 [ 846.359605] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 846.364789] RIP: 0033:0x7fd12fca557a [ 846.368491] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 846.387387] RSP: 002b:00007fd12e618f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 846.395090] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca557a [ 846.402348] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fd12e618fe0 [ 846.409617] RBP: 00007fd12e619020 R08: 00007fd12e619020 R09: 0000000020000000 [ 846.416879] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 846.424134] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 [ 846.451254] erofs: read_super, device -> /dev/loop5 [ 846.456420] erofs: options -> noacl, [ 846.460666] erofs: root inode @ nid 0 [ 846.464743] erofs: bogus i_mode (0) @ nid 0 07:27:02 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010600000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:27:02 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 45) [ 846.560338] squashfs: SQUASHFS error: unable to read xattr id index table 07:27:02 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:27:02 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000b00006000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005", 0x180}], 0x0, &(0x7f0000000080)) [ 846.719706] erofs: read_super, device -> /dev/loop2 [ 846.724755] erofs: options -> noacl,user_xattr, [ 846.743788] erofs: root inode @ nid 36 [ 846.751675] erofs: mounted on /dev/loop2 with opts: noacl. 07:27:02 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000039300000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:27:02 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x268a, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 846.794251] erofs: read_super, device -> /dev/loop5 [ 846.809282] erofs: options -> noacl, [ 846.826158] erofs: root inode @ nid 0 [ 846.829796] FAULT_INJECTION: forcing a failure. [ 846.829796] name failslab, interval 1, probability 0, space 0, times 0 [ 846.831698] erofs: unmounted for /dev/loop2 [ 846.862560] CPU: 1 PID: 31311 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 846.864945] erofs: bogus i_mode (0) @ nid 0 [ 846.870454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 846.870461] Call Trace: [ 846.870484] dump_stack+0x1fc/0x2ef [ 846.870506] should_fail.cold+0xa/0xf [ 846.870524] ? setup_fault_attr+0x200/0x200 [ 846.870540] ? lock_acquire+0x170/0x3c0 [ 846.870560] __should_failslab+0x115/0x180 [ 846.870578] should_failslab+0x5/0x10 [ 846.910427] __kmalloc+0x2ab/0x3c0 [ 846.913952] ? prealloc_shrinker+0x15d/0x340 [ 846.918344] prealloc_shrinker+0x15d/0x340 [ 846.922569] sget_userns+0x7b4/0xcd0 [ 846.926268] ? set_bdev_super+0x110/0x110 [ 846.930398] ? ns_test_super+0x50/0x50 [ 846.934268] ? set_bdev_super+0x110/0x110 [ 846.938397] ? ns_test_super+0x50/0x50 [ 846.942268] sget+0x102/0x140 [ 846.945358] mount_bdev+0xf8/0x3b0 [ 846.948878] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 846.954138] erofs_mount+0x8c/0xc0 [ 846.957658] ? erofs_kill_sb+0x20/0x20 [ 846.961529] ? alloc_pages_current+0x19b/0x2a0 [ 846.966093] ? __lockdep_init_map+0x100/0x5a0 [ 846.970573] mount_fs+0xa3/0x310 [ 846.973922] vfs_kern_mount.part.0+0x68/0x470 [ 846.978412] do_mount+0x115c/0x2f50 [ 846.982022] ? cmp_ex_sort+0xc0/0xc0 [ 846.985732] ? __do_page_fault+0x180/0xd60 [ 846.989949] ? copy_mount_string+0x40/0x40 [ 846.994187] ? memset+0x20/0x40 [ 846.997457] ? copy_mount_options+0x26f/0x380 [ 847.001949] ksys_mount+0xcf/0x130 [ 847.005485] __x64_sys_mount+0xba/0x150 [ 847.009451] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 847.014017] do_syscall_64+0xf9/0x620 [ 847.017802] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 847.022984] RIP: 0033:0x7fd12fca557a [ 847.026690] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 847.045573] RSP: 002b:00007fd12e618f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 847.053263] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca557a [ 847.060527] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fd12e618fe0 [ 847.067775] RBP: 00007fd12e619020 R08: 00007fd12e619020 R09: 0000000020000000 [ 847.075028] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 847.082298] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 07:27:02 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010700000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:27:02 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 46) [ 847.232064] squashfs: SQUASHFS error: unable to read xattr id index table [ 847.282322] SQUASHFS error: xz decompression failed, data probably corrupt [ 847.289364] SQUASHFS error: squashfs_read_data failed to read block 0x8f [ 847.297707] erofs: read_super, device -> /dev/loop2 [ 847.303253] erofs: options -> noacl,user_xattr, [ 847.308820] erofs: root inode @ nid 36 [ 847.315687] erofs: mounted on /dev/loop2 with opts: noacl. [ 847.321647] SQUASHFS error: Unable to read metadata cache entry [8f] [ 847.329034] SQUASHFS error: Unable to read inode 0x11e 07:27:03 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x26ac, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 847.357918] FAULT_INJECTION: forcing a failure. [ 847.357918] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 847.369729] CPU: 0 PID: 31339 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 847.377600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 847.386939] Call Trace: [ 847.389530] dump_stack+0x1fc/0x2ef [ 847.393149] should_fail.cold+0xa/0xf [ 847.396932] ? setup_fault_attr+0x200/0x200 [ 847.401249] ? mark_held_locks+0xf0/0xf0 [ 847.405304] __alloc_pages_nodemask+0x239/0x2890 [ 847.410060] ? __lock_acquire+0x6de/0x3ff0 [ 847.414298] ? __lock_acquire+0x6de/0x3ff0 [ 847.418529] ? __lock_acquire+0x6de/0x3ff0 [ 847.422759] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 847.427596] ? mark_held_locks+0xf0/0xf0 [ 847.431642] ? mark_held_locks+0xf0/0xf0 [ 847.435684] ? lock_downgrade+0x720/0x720 [ 847.439826] ? blkdev_get+0x4ce/0x940 [ 847.443630] ? _atomic_dec_and_lock+0x122/0x1d0 [ 847.448300] cache_grow_begin+0xa4/0x8a0 [ 847.452345] ? setup_fault_attr+0x200/0x200 [ 847.456645] ? lock_acquire+0x170/0x3c0 [ 847.460616] cache_alloc_refill+0x273/0x340 [ 847.464933] kmem_cache_alloc_trace+0x354/0x380 [ 847.469601] ? set_bdev_super+0x110/0x110 [ 847.473745] ? ns_test_super+0x50/0x50 [ 847.477624] sget_userns+0x122/0xcd0 [ 847.481327] ? set_bdev_super+0x110/0x110 [ 847.485485] ? ns_test_super+0x50/0x50 [ 847.489373] ? set_bdev_super+0x110/0x110 [ 847.493518] ? ns_test_super+0x50/0x50 [ 847.497389] sget+0x102/0x140 [ 847.500488] mount_bdev+0xf8/0x3b0 [ 847.504032] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 847.509300] erofs_mount+0x8c/0xc0 [ 847.512824] ? erofs_kill_sb+0x20/0x20 [ 847.516697] ? alloc_pages_current+0x19b/0x2a0 [ 847.521268] ? __lockdep_init_map+0x100/0x5a0 [ 847.525752] mount_fs+0xa3/0x310 [ 847.529103] vfs_kern_mount.part.0+0x68/0x470 [ 847.533606] do_mount+0x115c/0x2f50 [ 847.537214] ? cmp_ex_sort+0xc0/0xc0 [ 847.540919] ? __do_page_fault+0x180/0xd60 [ 847.545144] ? copy_mount_string+0x40/0x40 [ 847.549362] ? memset+0x20/0x40 [ 847.552625] ? copy_mount_options+0x26f/0x380 [ 847.557101] ksys_mount+0xcf/0x130 [ 847.560640] __x64_sys_mount+0xba/0x150 [ 847.564622] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 847.569184] do_syscall_64+0xf9/0x620 [ 847.572978] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 847.578146] RIP: 0033:0x7fd12fca557a [ 847.581866] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 847.600763] RSP: 002b:00007fd12e618f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 07:27:03 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1c0}], 0x0, &(0x7f0000000080)) [ 847.608469] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca557a [ 847.615720] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fd12e618fe0 [ 847.622980] RBP: 00007fd12e619020 R08: 00007fd12e619020 R09: 0000000020000000 [ 847.630248] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 847.637518] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 [ 847.648862] erofs: unmounted for /dev/loop2 [ 847.650638] erofs: read_super, device -> /dev/loop1 07:27:03 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000039400000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 847.658375] erofs: options -> noacl,user_xattr, [ 847.665984] erofs: root inode @ nid 36 [ 847.671056] erofs: mounted on /dev/loop1 with opts: noacl. 07:27:03 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:27:03 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 47) [ 847.703819] erofs: read_super, device -> /dev/loop5 [ 847.722153] erofs: options -> noacl, [ 847.729641] erofs: unmounted for /dev/loop1 [ 847.734898] erofs: root inode @ nid 0 [ 847.747978] erofs: bogus i_mode (0) @ nid 0 07:27:03 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000039500000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:27:03 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000000008000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) 07:27:03 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010800000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 847.845409] squashfs: SQUASHFS error: unable to read xattr id index table [ 847.863192] erofs: read_super, device -> /dev/loop2 [ 847.871224] erofs: options -> noacl,user_xattr, 07:27:03 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1c0}], 0x0, &(0x7f0000000080)) [ 847.898492] erofs: root inode @ nid 36 [ 847.904214] erofs: mounted on /dev/loop2 with opts: noacl. 07:27:03 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000039600000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:27:03 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f00, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 847.966756] erofs: read_super, device -> /dev/loop5 [ 847.981981] erofs: options -> noacl, [ 847.993743] erofs: unmounted for /dev/loop2 [ 848.012837] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 848.035418] FAULT_INJECTION: forcing a failure. [ 848.035418] name failslab, interval 1, probability 0, space 0, times 0 [ 848.043562] erofs: root inode @ nid 0 [ 848.062262] CPU: 1 PID: 31383 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 848.070164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 848.071370] erofs: bogus i_mode (0) @ nid 0 [ 848.079512] Call Trace: [ 848.086480] dump_stack+0x1fc/0x2ef [ 848.090147] should_fail.cold+0xa/0xf [ 848.093957] ? setup_fault_attr+0x200/0x200 [ 848.098281] ? lock_acquire+0x170/0x3c0 [ 848.102268] __should_failslab+0x115/0x180 [ 848.106512] should_failslab+0x5/0x10 [ 848.110315] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 848.115418] __kmalloc_node+0x38/0x70 [ 848.119215] kvmalloc_node+0x61/0xf0 [ 848.122929] __list_lru_init+0x4c6/0x7f0 [ 848.126985] ? up_read+0xb3/0x110 [ 848.130423] sget_userns+0x7e2/0xcd0 [ 848.134121] ? set_bdev_super+0x110/0x110 [ 848.138266] ? ns_test_super+0x50/0x50 [ 848.142143] ? set_bdev_super+0x110/0x110 [ 848.146293] ? ns_test_super+0x50/0x50 [ 848.150173] sget+0x102/0x140 [ 848.153265] mount_bdev+0xf8/0x3b0 [ 848.156802] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 848.162062] erofs_mount+0x8c/0xc0 [ 848.165584] ? erofs_kill_sb+0x20/0x20 [ 848.169454] ? alloc_pages_current+0x19b/0x2a0 [ 848.174018] ? __lockdep_init_map+0x100/0x5a0 [ 848.178498] mount_fs+0xa3/0x310 [ 848.181858] vfs_kern_mount.part.0+0x68/0x470 [ 848.186343] do_mount+0x115c/0x2f50 [ 848.189965] ? cmp_ex_sort+0xc0/0xc0 [ 848.193685] ? __do_page_fault+0x180/0xd60 [ 848.197912] ? copy_mount_string+0x40/0x40 [ 848.202148] ? memset+0x20/0x40 [ 848.205425] ? copy_mount_options+0x26f/0x380 [ 848.209912] ksys_mount+0xcf/0x130 [ 848.213448] __x64_sys_mount+0xba/0x150 [ 848.217417] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 848.221988] do_syscall_64+0xf9/0x620 [ 848.225787] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 848.230959] RIP: 0033:0x7fd12fca557a [ 848.234655] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 848.253537] RSP: 002b:00007fd12e618f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 848.261226] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca557a [ 848.268475] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fd12e618fe0 [ 848.275722] RBP: 00007fd12e619020 R08: 00007fd12e619020 R09: 0000000020000000 [ 848.282969] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 848.290215] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 [ 848.325010] squashfs: SQUASHFS error: unable to read xattr id index table 07:27:04 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000039700000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:27:04 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 48) [ 848.480241] erofs: read_super, device -> /dev/loop2 07:27:04 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:27:04 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1c0}], 0x0, &(0x7f0000000080)) 07:27:04 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf016000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 848.503577] erofs: options -> noacl,user_xattr, [ 848.521132] erofs: root inode @ nid 36 [ 848.544586] erofs: mounted on /dev/loop2 with opts: noacl. [ 848.573544] FAULT_INJECTION: forcing a failure. [ 848.573544] name failslab, interval 1, probability 0, space 0, times 0 [ 848.579450] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 07:27:04 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6000, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 848.597615] squashfs: SQUASHFS error: unable to read xattr id index table [ 848.609258] erofs: unmounted for /dev/loop2 [ 848.619565] CPU: 1 PID: 31417 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 848.627454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 848.636794] Call Trace: [ 848.639375] dump_stack+0x1fc/0x2ef [ 848.642985] should_fail.cold+0xa/0xf [ 848.646767] ? setup_fault_attr+0x200/0x200 [ 848.651068] ? lock_acquire+0x170/0x3c0 [ 848.655034] __should_failslab+0x115/0x180 [ 848.659252] should_failslab+0x5/0x10 [ 848.663044] __kmalloc+0x2ab/0x3c0 [ 848.666566] ? __list_lru_init+0xd3/0x7f0 [ 848.670707] __list_lru_init+0xd3/0x7f0 [ 848.674662] ? up_write+0x18/0x150 [ 848.678184] sget_userns+0x7e2/0xcd0 [ 848.681880] ? set_bdev_super+0x110/0x110 [ 848.686011] ? ns_test_super+0x50/0x50 [ 848.689880] ? set_bdev_super+0x110/0x110 [ 848.694008] ? ns_test_super+0x50/0x50 [ 848.697878] sget+0x102/0x140 [ 848.700966] mount_bdev+0xf8/0x3b0 [ 848.704487] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 848.709744] erofs_mount+0x8c/0xc0 [ 848.713264] ? erofs_kill_sb+0x20/0x20 [ 848.717139] ? alloc_pages_current+0x19b/0x2a0 [ 848.721701] ? __lockdep_init_map+0x100/0x5a0 [ 848.726177] mount_fs+0xa3/0x310 [ 848.729535] vfs_kern_mount.part.0+0x68/0x470 [ 848.734026] do_mount+0x115c/0x2f50 [ 848.737639] ? cmp_ex_sort+0xc0/0xc0 [ 848.741335] ? __do_page_fault+0x180/0xd60 [ 848.745549] ? copy_mount_string+0x40/0x40 [ 848.749767] ? memset+0x20/0x40 [ 848.753029] ? copy_mount_options+0x26f/0x380 [ 848.757506] ksys_mount+0xcf/0x130 [ 848.761027] __x64_sys_mount+0xba/0x150 [ 848.764981] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 848.769541] do_syscall_64+0xf9/0x620 [ 848.773324] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 848.778493] RIP: 0033:0x7fd12fca557a 07:27:04 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1e0}], 0x0, &(0x7f0000000080)) [ 848.782184] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 848.801065] RSP: 002b:00007fd12e618f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 848.808754] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca557a [ 848.816001] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fd12e618fe0 [ 848.823256] RBP: 00007fd12e619020 R08: 00007fd12e619020 R09: 0000000020000000 [ 848.830513] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 848.837762] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 07:27:04 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000039800000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 848.934330] erofs: read_super, device -> /dev/loop5 [ 848.944346] erofs: options -> noacl, [ 848.949011] erofs: root inode @ nid 0 [ 848.955218] erofs: bogus i_mode (0) @ nid 0 07:27:04 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 49) 07:27:04 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:27:04 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010003000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 849.054220] squashfs: SQUASHFS error: unable to read xattr id index table 07:27:04 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1e0}], 0x0, &(0x7f0000000080)) [ 849.100578] erofs: read_super, device -> /dev/loop2 [ 849.106089] erofs: options -> noacl,user_xattr, [ 849.122667] erofs: root inode @ nid 36 [ 849.126922] erofs: mounted on /dev/loop2 with opts: noacl. 07:27:04 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8203, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 849.152281] FAULT_INJECTION: forcing a failure. [ 849.152281] name failslab, interval 1, probability 0, space 0, times 0 [ 849.156878] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 849.177379] CPU: 1 PID: 31451 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 849.185274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 849.194621] Call Trace: [ 849.197215] dump_stack+0x1fc/0x2ef 07:27:04 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000039900000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 849.200855] should_fail.cold+0xa/0xf [ 849.204667] ? setup_fault_attr+0x200/0x200 [ 849.208995] ? lock_acquire+0x170/0x3c0 [ 849.212976] __should_failslab+0x115/0x180 [ 849.217209] should_failslab+0x5/0x10 [ 849.221002] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 849.226099] __kmalloc_node+0x38/0x70 [ 849.229894] kvmalloc_node+0x61/0xf0 [ 849.233590] __list_lru_init+0x4c6/0x7f0 [ 849.237635] ? up_read+0xb3/0x110 [ 849.241082] sget_userns+0x7e2/0xcd0 [ 849.244777] ? set_bdev_super+0x110/0x110 [ 849.248906] ? ns_test_super+0x50/0x50 [ 849.252803] ? set_bdev_super+0x110/0x110 [ 849.256942] ? ns_test_super+0x50/0x50 [ 849.260811] sget+0x102/0x140 [ 849.263899] mount_bdev+0xf8/0x3b0 [ 849.267431] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 849.272702] erofs_mount+0x8c/0xc0 [ 849.276229] ? erofs_kill_sb+0x20/0x20 [ 849.280111] ? alloc_pages_current+0x19b/0x2a0 [ 849.284700] ? __lockdep_init_map+0x100/0x5a0 [ 849.289182] mount_fs+0xa3/0x310 [ 849.292535] vfs_kern_mount.part.0+0x68/0x470 [ 849.297018] do_mount+0x115c/0x2f50 [ 849.300629] ? cmp_ex_sort+0xc0/0xc0 [ 849.304327] ? __do_page_fault+0x180/0xd60 [ 849.308561] ? copy_mount_string+0x40/0x40 [ 849.312783] ? memset+0x20/0x40 [ 849.316059] ? copy_mount_options+0x26f/0x380 [ 849.320540] ksys_mount+0xcf/0x130 [ 849.324061] __x64_sys_mount+0xba/0x150 [ 849.328029] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 849.332603] do_syscall_64+0xf9/0x620 [ 849.336391] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 849.341559] RIP: 0033:0x7fd12fca557a [ 849.345252] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 849.364136] RSP: 002b:00007fd12e618f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 849.371825] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca557a [ 849.379074] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fd12e618fe0 [ 849.386323] RBP: 00007fd12e619020 R08: 00007fd12e619020 R09: 0000000020000000 [ 849.393569] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 849.400820] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 [ 849.409834] erofs: unmounted for /dev/loop2 [ 849.422810] erofs: read_super, device -> /dev/loop5 [ 849.427842] erofs: options -> noacl, [ 849.436701] erofs: root inode @ nid 0 [ 849.441035] erofs: bogus i_mode (0) @ nid 0 07:27:05 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000000014000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) 07:27:05 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf012a03000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:27:05 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 50) [ 849.551552] squashfs: SQUASHFS error: unable to read xattr id index table 07:27:05 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000039a00000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 849.671140] erofs: read_super, device -> /dev/loop2 [ 849.679669] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 849.686375] erofs: options -> noacl,user_xattr, [ 849.691271] erofs: read_super, device -> /dev/loop5 [ 849.695831] erofs: root inode @ nid 36 [ 849.702843] erofs: options -> noacl, [ 849.704415] erofs: mounted on /dev/loop2 with opts: noacl. [ 849.713750] erofs: root inode @ nid 0 07:27:05 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1e0}], 0x0, &(0x7f0000000080)) [ 849.717919] erofs: bogus i_mode (0) @ nid 0 07:27:05 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8303, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 849.779850] erofs: unmounted for /dev/loop2 [ 849.850078] FAULT_INJECTION: forcing a failure. [ 849.850078] name failslab, interval 1, probability 0, space 0, times 0 [ 849.861738] CPU: 1 PID: 31496 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 849.869624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 849.878968] Call Trace: [ 849.881540] dump_stack+0x1fc/0x2ef [ 849.885154] should_fail.cold+0xa/0xf [ 849.888945] ? setup_fault_attr+0x200/0x200 [ 849.893249] ? lock_acquire+0x170/0x3c0 [ 849.897220] __should_failslab+0x115/0x180 [ 849.901447] should_failslab+0x5/0x10 [ 849.905230] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 849.910315] __kmalloc_node+0x38/0x70 [ 849.914100] kvmalloc_node+0x61/0xf0 [ 849.917794] __list_lru_init+0x4c6/0x7f0 [ 849.921839] ? up_read+0xb3/0x110 [ 849.925277] sget_userns+0x7e2/0xcd0 [ 849.928970] ? set_bdev_super+0x110/0x110 [ 849.933100] ? ns_test_super+0x50/0x50 [ 849.936971] ? set_bdev_super+0x110/0x110 [ 849.941095] ? ns_test_super+0x50/0x50 [ 849.944964] sget+0x102/0x140 [ 849.948053] mount_bdev+0xf8/0x3b0 [ 849.951579] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 849.956842] erofs_mount+0x8c/0xc0 [ 849.960374] ? erofs_kill_sb+0x20/0x20 [ 849.964254] ? alloc_pages_current+0x19b/0x2a0 [ 849.968817] ? __lockdep_init_map+0x100/0x5a0 [ 849.973293] mount_fs+0xa3/0x310 [ 849.976645] vfs_kern_mount.part.0+0x68/0x470 [ 849.981126] do_mount+0x115c/0x2f50 [ 849.984743] ? cmp_ex_sort+0xc0/0xc0 [ 849.988453] ? __do_page_fault+0x180/0xd60 [ 849.992676] ? copy_mount_string+0x40/0x40 [ 849.996902] ? memset+0x20/0x40 [ 850.000180] ? copy_mount_options+0x26f/0x380 [ 850.004668] ksys_mount+0xcf/0x130 [ 850.008194] __x64_sys_mount+0xba/0x150 [ 850.012148] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 850.016718] do_syscall_64+0xf9/0x620 [ 850.020513] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 850.025690] RIP: 0033:0x7fd12fca557a [ 850.029394] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 850.048274] RSP: 002b:00007fd12e618f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 850.055960] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca557a [ 850.063208] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fd12e618fe0 [ 850.070464] RBP: 00007fd12e619020 R08: 00007fd12e619020 R09: 0000000020000000 [ 850.077716] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 850.084966] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 07:27:05 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:27:05 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010005000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:27:05 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f00400026b100000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:27:05 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 51) 07:27:05 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1f0}], 0x0, &(0x7f0000000080)) [ 850.180332] squashfs: SQUASHFS error: unable to read xattr id index table [ 850.259440] erofs: read_super, device -> /dev/loop2 [ 850.264490] erofs: options -> noacl,user_xattr, [ 850.272021] erofs: read_super, device -> /dev/loop5 [ 850.278518] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 850.293258] erofs: root inode @ nid 36 [ 850.297344] FAULT_INJECTION: forcing a failure. [ 850.297344] name failslab, interval 1, probability 0, space 0, times 0 [ 850.299336] erofs: options -> noacl, [ 850.318069] erofs: mounted on /dev/loop2 with opts: noacl. [ 850.327304] erofs: root inode @ nid 0 [ 850.328168] CPU: 0 PID: 31534 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 850.336842] erofs: bogus i_mode (0) @ nid 0 [ 850.338985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 850.338990] Call Trace: [ 850.339012] dump_stack+0x1fc/0x2ef [ 850.339037] should_fail.cold+0xa/0xf [ 850.339058] ? setup_fault_attr+0x200/0x200 [ 850.366930] ? lock_acquire+0x170/0x3c0 [ 850.370898] __should_failslab+0x115/0x180 [ 850.375125] should_failslab+0x5/0x10 [ 850.378915] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 850.384009] __kmalloc_node+0x38/0x70 [ 850.387798] kvmalloc_node+0x61/0xf0 [ 850.391497] __list_lru_init+0x4c6/0x7f0 [ 850.395547] ? up_read+0xb3/0x110 [ 850.398991] sget_userns+0x810/0xcd0 [ 850.402693] ? set_bdev_super+0x110/0x110 [ 850.406830] ? ns_test_super+0x50/0x50 [ 850.410706] ? set_bdev_super+0x110/0x110 [ 850.414840] ? ns_test_super+0x50/0x50 [ 850.418710] sget+0x102/0x140 [ 850.421802] mount_bdev+0xf8/0x3b0 [ 850.425327] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 850.430593] erofs_mount+0x8c/0xc0 [ 850.434123] ? erofs_kill_sb+0x20/0x20 [ 850.438001] ? alloc_pages_current+0x19b/0x2a0 [ 850.442566] ? __lockdep_init_map+0x100/0x5a0 [ 850.447050] mount_fs+0xa3/0x310 [ 850.450408] vfs_kern_mount.part.0+0x68/0x470 [ 850.454891] do_mount+0x115c/0x2f50 [ 850.458509] ? cmp_ex_sort+0xc0/0xc0 [ 850.462214] ? __do_page_fault+0x180/0xd60 [ 850.466441] ? copy_mount_string+0x40/0x40 [ 850.470673] ? memset+0x20/0x40 [ 850.473941] ? copy_mount_options+0x26f/0x380 [ 850.478509] ksys_mount+0xcf/0x130 [ 850.482039] __x64_sys_mount+0xba/0x150 [ 850.486012] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 850.490599] do_syscall_64+0xf9/0x620 [ 850.494390] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 850.499564] RIP: 0033:0x7fd12fca557a [ 850.503267] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 850.522149] RSP: 002b:00007fd12e618f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 850.529840] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca557a [ 850.537092] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fd12e618fe0 [ 850.544343] RBP: 00007fd12e619020 R08: 00007fd12e619020 R09: 0000000020000000 [ 850.551595] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 850.558848] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 07:27:06 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8a26, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) 07:27:06 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000c0ed00000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 850.629767] erofs: unmounted for /dev/loop2 07:27:06 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 850.680972] squashfs: SQUASHFS error: unable to read xattr id index table 07:27:06 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 52) 07:27:06 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010006000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:27:06 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1f0}], 0x0, &(0x7f0000000080)) [ 850.808870] erofs: read_super, device -> /dev/loop1 [ 850.822310] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 850.830084] erofs: read_super, device -> /dev/loop5 [ 850.837185] erofs: options -> noacl, [ 850.839759] erofs: options -> noacl,user_xattr, [ 850.849462] erofs: root inode @ nid 0 [ 850.849690] FAULT_INJECTION: forcing a failure. [ 850.849690] name failslab, interval 1, probability 0, space 0, times 0 [ 850.853715] erofs: bogus i_mode (0) @ nid 0 [ 850.873948] CPU: 1 PID: 31555 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 850.881837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 850.891177] Call Trace: [ 850.893757] dump_stack+0x1fc/0x2ef [ 850.897372] should_fail.cold+0xa/0xf [ 850.901157] ? do_mount+0x115c/0x2f50 [ 850.904949] ? setup_fault_attr+0x200/0x200 [ 850.909257] ? blk_queue_enter+0x40b/0xb70 [ 850.913489] __should_failslab+0x115/0x180 [ 850.917717] should_failslab+0x5/0x10 [ 850.921510] kmem_cache_alloc_node+0x54/0x3b0 [ 850.926008] create_task_io_context+0x2c/0x430 [ 850.930587] generic_make_request_checks+0x1c4f/0x22e0 [ 850.935868] ? should_fail_bio.isra.0+0xa0/0xa0 [ 850.940528] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 850.945536] ? kmem_cache_alloc+0x315/0x370 [ 850.949854] generic_make_request+0x23f/0xdf0 [ 850.954347] ? blk_put_request+0x110/0x110 [ 850.958574] ? lock_downgrade+0x720/0x720 [ 850.962718] submit_bio+0xb1/0x430 [ 850.966246] ? generic_make_request+0xdf0/0xdf0 [ 850.970899] ? check_preemption_disabled+0x41/0x280 [ 850.975906] ? guard_bio_eod+0x2a0/0x650 [ 850.979953] submit_bh_wbc+0x5a7/0x760 [ 850.983831] __bread_gfp+0x14e/0x300 [ 850.987532] erofs_fill_super+0x207/0x12cc [ 850.991757] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 850.997016] ? vsprintf+0x30/0x30 [ 851.000458] ? wait_for_completion_io+0x10/0x10 [ 851.005109] ? set_blocksize+0x163/0x3f0 [ 851.009176] mount_bdev+0x2fc/0x3b0 [ 851.012801] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 851.018080] erofs_mount+0x8c/0xc0 [ 851.021608] ? erofs_kill_sb+0x20/0x20 [ 851.025485] ? alloc_pages_current+0x19b/0x2a0 [ 851.030058] ? __lockdep_init_map+0x100/0x5a0 [ 851.034542] mount_fs+0xa3/0x310 [ 851.037903] vfs_kern_mount.part.0+0x68/0x470 [ 851.042386] do_mount+0x115c/0x2f50 [ 851.046004] ? cmp_ex_sort+0xc0/0xc0 [ 851.049709] ? __do_page_fault+0x180/0xd60 [ 851.053935] ? copy_mount_string+0x40/0x40 [ 851.058168] ? memset+0x20/0x40 [ 851.061440] ? copy_mount_options+0x26f/0x380 [ 851.065925] ksys_mount+0xcf/0x130 [ 851.069456] __x64_sys_mount+0xba/0x150 [ 851.073416] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 851.077987] do_syscall_64+0xf9/0x620 [ 851.081779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 851.086953] RIP: 0033:0x7fd12fca557a [ 851.090651] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 851.109534] RSP: 002b:00007fd12e618f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 851.117225] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca557a [ 851.124476] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fd12e618fe0 [ 851.131735] RBP: 00007fd12e619020 R08: 00007fd12e619020 R09: 0000000020000000 [ 851.138995] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 851.146261] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 07:27:06 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f00400000000000004c000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) [ 851.169657] erofs: root inode @ nid 36 07:27:06 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010007000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:27:07 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f0040000fff00000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 851.209580] erofs: mounted on /dev/loop1 with opts: noacl. [ 851.226010] erofs: read_super, device -> /dev/loop2 [ 851.239420] erofs: options -> noacl,user_xattr, [ 851.251827] erofs: root inode @ nid 36 07:27:07 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 53) [ 851.262847] erofs: mounted on /dev/loop2 with opts: noacl. [ 851.280305] squashfs: SQUASHFS error: unable to read xattr id index table [ 851.299701] erofs: unmounted for /dev/loop1 07:27:07 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xac26, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 851.330743] erofs: unmounted for /dev/loop2 07:27:07 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1f0}], 0x0, &(0x7f0000000080)) [ 851.359499] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 851.381672] erofs: read_super, device -> /dev/loop5 [ 851.386707] erofs: options -> noacl, [ 851.393201] erofs: root inode @ nid 0 [ 851.397378] erofs: bogus i_mode (0) @ nid 0 07:27:07 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:27:07 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010020000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:27:07 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000002000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 851.519825] squashfs: SQUASHFS error: unable to read xattr id index table [ 851.528520] erofs: read_super, device -> /dev/loop2 [ 851.539553] erofs: read_super, device -> /dev/loop1 [ 851.547953] erofs: options -> noacl,user_xattr, 07:27:07 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1f8}], 0x0, &(0x7f0000000080)) [ 851.571594] erofs: options -> noacl,user_xattr, [ 851.585328] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 851.599969] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 851.600854] erofs: root inode @ nid 36 [ 851.609728] erofs: read_super, device -> /dev/loop5 [ 851.616450] squashfs: SQUASHFS error: unable to read xattr id index table [ 851.619882] erofs: root inode @ nid 36 [ 851.623592] erofs: options -> noacl, [ 851.632228] FAULT_INJECTION: forcing a failure. [ 851.632228] name failslab, interval 1, probability 0, space 0, times 0 [ 851.647043] erofs: root inode @ nid 0 [ 851.650535] CPU: 0 PID: 31609 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 851.658716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 851.668054] Call Trace: [ 851.670631] dump_stack+0x1fc/0x2ef [ 851.674250] should_fail.cold+0xa/0xf [ 851.678039] ? setup_fault_attr+0x200/0x200 [ 851.682348] ? lock_acquire+0x170/0x3c0 [ 851.686315] __should_failslab+0x115/0x180 [ 851.690538] should_failslab+0x5/0x10 [ 851.694324] kmem_cache_alloc+0x277/0x370 [ 851.698456] ? destroy_inode+0x20/0x20 [ 851.702331] alloc_inode+0x18/0x50 [ 851.705859] ? destroy_inode+0x20/0x20 [ 851.709730] alloc_inode+0x5d/0x180 [ 851.713339] new_inode+0x1d/0xf0 [ 851.716693] erofs_fill_super+0xde9/0x12cc [ 851.720919] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 851.726181] ? vsprintf+0x30/0x30 [ 851.729622] ? wait_for_completion_io+0x10/0x10 [ 851.734275] ? set_blocksize+0x163/0x3f0 [ 851.738331] mount_bdev+0x2fc/0x3b0 [ 851.741944] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 851.747211] erofs_mount+0x8c/0xc0 [ 851.750742] ? erofs_kill_sb+0x20/0x20 [ 851.754620] ? alloc_pages_current+0x19b/0x2a0 [ 851.759188] ? __lockdep_init_map+0x100/0x5a0 [ 851.763667] mount_fs+0xa3/0x310 [ 851.767024] vfs_kern_mount.part.0+0x68/0x470 [ 851.771509] do_mount+0x115c/0x2f50 [ 851.775131] ? cmp_ex_sort+0xc0/0xc0 [ 851.778831] ? __do_page_fault+0x180/0xd60 [ 851.783050] ? copy_mount_string+0x40/0x40 [ 851.787274] ? memset+0x20/0x40 [ 851.790545] ? copy_mount_options+0x26f/0x380 [ 851.795028] ksys_mount+0xcf/0x130 [ 851.798557] __x64_sys_mount+0xba/0x150 [ 851.802519] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 851.807086] do_syscall_64+0xf9/0x620 [ 851.810880] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 851.816055] RIP: 0033:0x7fd12fca557a [ 851.819755] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 851.838640] RSP: 002b:00007fd12e618f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 851.846333] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca557a [ 851.853587] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fd12e618fe0 [ 851.860844] RBP: 00007fd12e619020 R08: 00007fd12e619020 R09: 0000000020000000 [ 851.868108] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 851.875361] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 [ 851.888531] erofs: bogus i_mode (0) @ nid 0 [ 851.892807] erofs: mounted on /dev/loop2 with opts: noacl. 07:27:07 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01032a000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:27:07 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 54) 07:27:07 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000000006000d00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) 07:27:07 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xdd03, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 852.011824] squashfs: SQUASHFS error: unable to read xattr id index table 07:27:07 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000004000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 852.055854] erofs: unmounted for /dev/loop2 07:27:07 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1f8}], 0x0, &(0x7f0000000080)) [ 852.099881] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 852.111221] squashfs: SQUASHFS error: unable to read xattr id index table [ 852.119356] erofs: read_super, device -> /dev/loop5 [ 852.124384] erofs: options -> noacl, [ 852.137022] erofs: read_super, device -> /dev/loop1 [ 852.144964] erofs: root inode @ nid 0 [ 852.148171] erofs: options -> noacl,user_xattr, [ 852.155718] erofs: bogus i_mode (0) @ nid 0 [ 852.166095] FAULT_INJECTION: forcing a failure. [ 852.166095] name failslab, interval 1, probability 0, space 0, times 0 [ 852.182478] CPU: 0 PID: 31650 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 852.190373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 852.199728] Call Trace: [ 852.202316] dump_stack+0x1fc/0x2ef [ 852.205940] should_fail.cold+0xa/0xf [ 852.209741] ? setup_fault_attr+0x200/0x200 [ 852.214067] ? lock_acquire+0x170/0x3c0 [ 852.218038] __should_failslab+0x115/0x180 [ 852.222269] should_failslab+0x5/0x10 [ 852.226068] kmem_cache_alloc_trace+0x284/0x380 [ 852.230743] erofs_fill_super+0x167/0x12cc [ 852.234976] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 852.240249] ? vsprintf+0x30/0x30 [ 852.243697] ? wait_for_completion_io+0x10/0x10 [ 852.248346] ? set_blocksize+0x163/0x3f0 [ 852.252390] mount_bdev+0x2fc/0x3b0 [ 852.256022] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 852.261298] erofs_mount+0x8c/0xc0 [ 852.264836] ? erofs_kill_sb+0x20/0x20 [ 852.268714] ? alloc_pages_current+0x19b/0x2a0 [ 852.273280] ? __lockdep_init_map+0x100/0x5a0 [ 852.277765] mount_fs+0xa3/0x310 [ 852.281132] vfs_kern_mount.part.0+0x68/0x470 [ 852.285623] do_mount+0x115c/0x2f50 [ 852.289250] ? cmp_ex_sort+0xc0/0xc0 [ 852.292970] ? __do_page_fault+0x180/0xd60 [ 852.297195] ? copy_mount_string+0x40/0x40 [ 852.301454] ? memset+0x20/0x40 [ 852.304725] ? copy_mount_options+0x26f/0x380 [ 852.309215] ksys_mount+0xcf/0x130 [ 852.312764] __x64_sys_mount+0xba/0x150 [ 852.316736] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 852.321309] do_syscall_64+0xf9/0x620 [ 852.325128] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 852.330318] RIP: 0033:0x7fd12fca557a [ 852.334032] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 852.352927] RSP: 002b:00007fd12e618f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 852.360630] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca557a [ 852.367890] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fd12e618fe0 [ 852.375141] RBP: 00007fd12e619020 R08: 00007fd12e619020 R09: 0000000020000000 [ 852.382399] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 852.389666] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 07:27:08 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:27:08 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000010000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:27:08 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01003f000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:27:08 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 55) [ 852.527955] squashfs: SQUASHFS error: unable to read xattr id index table [ 852.539365] erofs: read_super, device -> /dev/loop2 [ 852.554044] erofs: options -> noacl,user_xattr, [ 852.568597] erofs: root inode @ nid 36 07:27:08 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1f8}], 0x0, &(0x7f0000000080)) [ 852.578937] erofs: mounted on /dev/loop2 with opts: noacl. [ 852.607659] SQUASHFS error: squashfs_read_data failed to read block 0x0 07:27:08 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xde03, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 852.625373] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 852.639449] squashfs: SQUASHFS error: unable to read xattr id index table [ 852.651260] erofs: unmounted for /dev/loop2 07:27:08 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000000006030e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de01", 0x1ff}], 0x0, &(0x7f0000000080)) [ 852.770275] erofs: read_super, device -> /dev/loop5 [ 852.774832] erofs: read_super, device -> /dev/loop1 [ 852.784394] squashfs: SQUASHFS error: unable to read xattr id index table [ 852.787104] erofs: options -> noacl, [ 852.800654] erofs: options -> noacl,user_xattr, 07:27:08 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000ffff1f000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 852.819378] erofs: root inode @ nid 0 [ 852.829708] FAULT_INJECTION: forcing a failure. [ 852.829708] name failslab, interval 1, probability 0, space 0, times 0 [ 852.841556] erofs: bogus i_mode (0) @ nid 0 [ 852.841978] CPU: 0 PID: 31687 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 852.853763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 852.863114] Call Trace: [ 852.865712] dump_stack+0x1fc/0x2ef [ 852.869352] should_fail.cold+0xa/0xf [ 852.873146] ? setup_fault_attr+0x200/0x200 [ 852.877453] ? lock_acquire+0x170/0x3c0 [ 852.881427] __should_failslab+0x115/0x180 [ 852.885659] should_failslab+0x5/0x10 [ 852.889455] kmem_cache_alloc_trace+0x284/0x380 [ 852.894125] erofs_fill_super+0x167/0x12cc [ 852.898341] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 852.903603] ? vsprintf+0x30/0x30 [ 852.907055] ? wait_for_completion_io+0x10/0x10 [ 852.911715] ? set_blocksize+0x163/0x3f0 [ 852.915775] mount_bdev+0x2fc/0x3b0 [ 852.919398] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 852.924673] erofs_mount+0x8c/0xc0 [ 852.928208] ? erofs_kill_sb+0x20/0x20 [ 852.932095] ? alloc_pages_current+0x19b/0x2a0 [ 852.936668] ? __lockdep_init_map+0x100/0x5a0 [ 852.941157] mount_fs+0xa3/0x310 [ 852.944519] vfs_kern_mount.part.0+0x68/0x470 [ 852.949012] do_mount+0x115c/0x2f50 [ 852.952654] ? cmp_ex_sort+0xc0/0xc0 [ 852.956379] ? __do_page_fault+0x180/0xd60 [ 852.960615] ? copy_mount_string+0x40/0x40 [ 852.964852] ? memset+0x20/0x40 [ 852.968132] ? copy_mount_options+0x26f/0x380 [ 852.972617] ksys_mount+0xcf/0x130 [ 852.976150] __x64_sys_mount+0xba/0x150 [ 852.980128] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 852.984718] do_syscall_64+0xf9/0x620 [ 852.988514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 852.993697] RIP: 0033:0x7fd12fca557a [ 852.997403] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 853.016286] RSP: 002b:00007fd12e618f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 853.023977] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca557a [ 853.031235] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fd12e618fe0 [ 853.038498] RBP: 00007fd12e619020 R08: 00007fd12e619020 R09: 0000000020000000 [ 853.045751] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 853.053017] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 07:27:08 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1fc}], 0x0, &(0x7f0000000080)) 07:27:08 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 56) [ 853.140401] erofs: read_super, device -> /dev/loop2 [ 853.146733] erofs: options -> noacl,user_xattr, [ 853.152736] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 07:27:08 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010060000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:27:08 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000020000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 853.182448] erofs: root inode @ nid 36 [ 853.194332] erofs: mounted on /dev/loop2 with opts: noacl. 07:27:09 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xdf03, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) 07:27:09 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 853.260686] erofs: read_super, device -> /dev/loop1 [ 853.265738] erofs: options -> noacl,user_xattr, [ 853.274427] erofs: read_super, device -> /dev/loop5 [ 853.277649] erofs: unmounted for /dev/loop2 [ 853.288185] erofs: options -> noacl, [ 853.288977] squashfs: SQUASHFS error: unable to read xattr id index table [ 853.296273] erofs: root inode @ nid 0 [ 853.308535] erofs: root inode @ nid 36 [ 853.313716] FAULT_INJECTION: forcing a failure. [ 853.313716] name failslab, interval 1, probability 0, space 0, times 0 [ 853.325371] erofs: bogus i_mode (0) @ nid 0 [ 853.336820] CPU: 1 PID: 31722 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 853.344720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 853.354071] Call Trace: [ 853.356662] dump_stack+0x1fc/0x2ef [ 853.360311] should_fail.cold+0xa/0xf [ 853.364103] ? setup_fault_attr+0x200/0x200 [ 853.368409] ? lock_acquire+0x170/0x3c0 [ 853.372388] __should_failslab+0x115/0x180 [ 853.376610] should_failslab+0x5/0x10 [ 853.380412] kmem_cache_alloc+0x277/0x370 [ 853.384553] ? destroy_inode+0x20/0x20 [ 853.388431] alloc_inode+0x18/0x50 [ 853.391966] ? destroy_inode+0x20/0x20 [ 853.395847] alloc_inode+0x5d/0x180 [ 853.399459] iget_locked+0x193/0x480 [ 853.403158] erofs_iget+0x27/0x2720 [ 853.406774] ? do_raw_spin_unlock+0x171/0x230 [ 853.411254] erofs_fill_super+0xf65/0x12cc [ 853.415562] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 853.420824] ? vsprintf+0x30/0x30 [ 853.424264] ? wait_for_completion_io+0x10/0x10 [ 853.428920] ? set_blocksize+0x163/0x3f0 [ 853.432965] mount_bdev+0x2fc/0x3b0 [ 853.436577] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 853.441835] erofs_mount+0x8c/0xc0 [ 853.445375] ? erofs_kill_sb+0x20/0x20 [ 853.449259] ? alloc_pages_current+0x19b/0x2a0 [ 853.453845] ? __lockdep_init_map+0x100/0x5a0 [ 853.458351] mount_fs+0xa3/0x310 [ 853.461728] vfs_kern_mount.part.0+0x68/0x470 [ 853.466224] do_mount+0x115c/0x2f50 [ 853.469837] ? cmp_ex_sort+0xc0/0xc0 [ 853.473532] ? __do_page_fault+0x180/0xd60 [ 853.477767] ? copy_mount_string+0x40/0x40 [ 853.481987] ? memset+0x20/0x40 [ 853.485248] ? copy_mount_options+0x26f/0x380 [ 853.489729] ksys_mount+0xcf/0x130 [ 853.493253] __x64_sys_mount+0xba/0x150 [ 853.497222] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 853.501795] do_syscall_64+0xf9/0x620 [ 853.505603] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 853.510780] RIP: 0033:0x7fd12fca557a [ 853.514475] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 853.533359] RSP: 002b:00007fd12e618f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 853.541049] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca557a [ 853.548302] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fd12e618fe0 [ 853.555559] RBP: 00007fd12e619020 R08: 00007fd12e619020 R09: 0000000020000000 [ 853.562810] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 853.570063] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 07:27:09 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000040000006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 853.608046] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 853.615709] squashfs: SQUASHFS error: unable to read xattr id index table 07:27:09 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1fc}], 0x0, &(0x7f0000000080)) 07:27:09 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 57) [ 853.683328] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported [ 853.695299] erofs: read_super, device -> /dev/loop2 [ 853.721228] erofs: options -> noacl,user_xattr, 07:27:09 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000d", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:27:09 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 853.735245] erofs: root inode @ nid 36 [ 853.748339] erofs: mounted on /dev/loop2 with opts: noacl. 07:27:09 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe003, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 853.787621] erofs: read_super, device -> /dev/loop1 [ 853.788007] squashfs: SQUASHFS error: unable to read xattr id index table [ 853.792998] erofs: options -> noacl,user_xattr, [ 853.808939] erofs: unmounted for /dev/loop2 [ 853.815559] erofs: root inode @ nid 36 [ 853.822209] FAULT_INJECTION: forcing a failure. [ 853.822209] name failslab, interval 1, probability 0, space 0, times 0 [ 853.835542] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 853.844832] squashfs: SQUASHFS error: unable to read xattr id index table [ 853.845482] CPU: 0 PID: 31757 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 853.859659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 853.869011] Call Trace: [ 853.871655] dump_stack+0x1fc/0x2ef [ 853.875290] should_fail.cold+0xa/0xf [ 853.879088] ? setup_fault_attr+0x200/0x200 [ 853.883402] ? static_obj+0x50/0x50 [ 853.887013] __should_failslab+0x115/0x180 [ 853.891229] should_failslab+0x5/0x10 [ 853.895012] kmem_cache_alloc+0x3f/0x370 [ 853.899064] ? mempool_alloc+0x350/0x350 [ 853.903125] mempool_alloc+0x146/0x350 [ 853.907005] ? mempool_resize+0x790/0x790 [ 853.911137] ? find_get_entry+0x4f4/0x8a0 [ 853.915286] bio_alloc_bioset+0x389/0x5e0 [ 853.919428] ? mark_page_accessed+0x581/0xda0 [ 853.924010] ? bvec_alloc+0x2f0/0x2f0 [ 853.927796] ? pagecache_get_page+0x1c4/0xd50 [ 853.932284] erofs_get_meta_page+0x2bb/0xcd0 [ 853.936679] erofs_iget+0x21b/0x2720 [ 853.940388] erofs_fill_super+0xf65/0x12cc [ 853.944614] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 853.949893] ? vsprintf+0x30/0x30 [ 853.953356] ? wait_for_completion_io+0x10/0x10 [ 853.958010] ? set_blocksize+0x163/0x3f0 [ 853.962072] mount_bdev+0x2fc/0x3b0 [ 853.965694] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 853.970960] erofs_mount+0x8c/0xc0 [ 853.974486] ? erofs_kill_sb+0x20/0x20 [ 853.978360] ? alloc_pages_current+0x19b/0x2a0 [ 853.982925] ? __lockdep_init_map+0x100/0x5a0 [ 853.987405] mount_fs+0xa3/0x310 [ 853.990770] vfs_kern_mount.part.0+0x68/0x470 [ 853.995253] do_mount+0x115c/0x2f50 [ 853.998865] ? cmp_ex_sort+0xc0/0xc0 [ 854.002579] ? __do_page_fault+0x180/0xd60 [ 854.006809] ? copy_mount_string+0x40/0x40 [ 854.011032] ? memset+0x20/0x40 [ 854.014297] ? copy_mount_options+0x26f/0x380 [ 854.018776] ksys_mount+0xcf/0x130 [ 854.022302] __x64_sys_mount+0xba/0x150 [ 854.026261] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 854.030823] do_syscall_64+0xf9/0x620 [ 854.034609] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 854.039899] RIP: 0033:0x7fd12fca557a [ 854.043604] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 854.062498] RSP: 002b:00007fd12e618f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 854.070195] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca557a [ 854.077460] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fd12e618fe0 [ 854.084722] RBP: 00007fd12e619020 R08: 00007fd12e619020 R09: 0000000020000000 [ 854.091987] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 854.099240] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 [ 854.109364] erofs: mounted on /dev/loop1 with opts: noacl. 07:27:09 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1fc}], 0x0, &(0x7f0000000080)) 07:27:09 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000010006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) 07:27:09 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 58) [ 854.156197] erofs: read_super, device -> /dev/loop5 [ 854.161391] erofs: options -> noacl, [ 854.165381] erofs: blksize 8192 isn't supported on this platform [ 854.178540] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 07:27:09 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf0100000014", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 854.207372] erofs: unmounted for /dev/loop1 [ 854.260619] erofs: read_super, device -> /dev/loop2 [ 854.265918] erofs: options -> noacl,user_xattr, [ 854.271658] erofs: root inode @ nid 36 [ 854.276529] erofs: mounted on /dev/loop2 with opts: noacl. 07:27:10 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) 07:27:10 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe103, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) [ 854.327930] squashfs: SQUASHFS error: unable to read xattr id index table [ 854.335864] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 854.359546] erofs: unmounted for /dev/loop2 [ 854.360638] erofs: read_super, device -> /dev/loop5 [ 854.372817] squashfs: SQUASHFS error: unable to read xattr id index table [ 854.375273] erofs: options -> noacl, [ 854.385536] erofs: blksize 1048576 isn't supported on this platform [ 854.409933] erofs: read_super, device -> /dev/loop1 [ 854.421665] erofs: options -> noacl,user_xattr, 07:27:10 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1fe}], 0x0, &(0x7f0000000080)) [ 854.428215] erofs: root inode @ nid 36 [ 854.434625] FAULT_INJECTION: forcing a failure. [ 854.434625] name failslab, interval 1, probability 0, space 0, times 0 [ 854.447811] CPU: 0 PID: 31801 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 854.455697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 854.465029] Call Trace: [ 854.467602] dump_stack+0x1fc/0x2ef [ 854.471231] should_fail.cold+0xa/0xf [ 854.475024] ? setup_fault_attr+0x200/0x200 [ 854.479336] ? lock_acquire+0x170/0x3c0 [ 854.483303] __should_failslab+0x115/0x180 [ 854.487520] should_failslab+0x5/0x10 [ 854.491304] kmem_cache_alloc+0x277/0x370 [ 854.495437] ? destroy_inode+0x20/0x20 [ 854.499315] alloc_inode+0x18/0x50 [ 854.502841] ? destroy_inode+0x20/0x20 [ 854.506709] alloc_inode+0x5d/0x180 [ 854.510326] iget_locked+0x193/0x480 [ 854.514033] erofs_iget+0x27/0x2720 [ 854.517642] ? do_raw_spin_unlock+0x171/0x230 [ 854.522117] erofs_fill_super+0xf65/0x12cc [ 854.526493] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 854.531754] ? vsprintf+0x30/0x30 [ 854.535195] ? wait_for_completion_io+0x10/0x10 [ 854.539854] ? set_blocksize+0x163/0x3f0 [ 854.543908] mount_bdev+0x2fc/0x3b0 [ 854.547521] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 854.552786] erofs_mount+0x8c/0xc0 [ 854.556313] ? erofs_kill_sb+0x20/0x20 [ 854.560197] ? alloc_pages_current+0x19b/0x2a0 [ 854.564772] ? __lockdep_init_map+0x100/0x5a0 [ 854.569260] mount_fs+0xa3/0x310 [ 854.572623] vfs_kern_mount.part.0+0x68/0x470 [ 854.577102] do_mount+0x115c/0x2f50 [ 854.580722] ? cmp_ex_sort+0xc0/0xc0 [ 854.584425] ? __do_page_fault+0x180/0xd60 [ 854.588640] ? copy_mount_string+0x40/0x40 [ 854.592860] ? memset+0x20/0x40 [ 854.596121] ? copy_mount_options+0x26f/0x380 [ 854.600611] ksys_mount+0xcf/0x130 [ 854.604141] __x64_sys_mount+0xba/0x150 [ 854.608098] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 854.612663] do_syscall_64+0xf9/0x620 [ 854.616448] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 854.621630] RIP: 0033:0x7fd12fca557a [ 854.625332] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 854.644269] RSP: 002b:00007fd12e618f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 854.651966] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca557a [ 854.659234] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fd12e618fe0 [ 854.666586] RBP: 00007fd12e619020 R08: 00007fd12e619020 R09: 0000000020000000 [ 854.673867] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 854.681237] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 07:27:10 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000d5b43e010006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 854.732476] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 07:27:10 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) (fail_nth: 59) 07:27:10 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf0100000037", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 07:27:10 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 854.858730] squashfs: SQUASHFS error: unable to read xattr id index table 07:27:10 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000b00006000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de", 0x1fe}], 0x0, &(0x7f0000000080)) [ 854.934659] erofs: read_super, device -> /dev/loop2 [ 854.935676] erofs: read_super, device -> /dev/loop5 [ 854.939891] erofs: options -> noacl,user_xattr, [ 854.951663] erofs: root inode @ nid 36 [ 854.952349] erofs: options -> noacl, [ 854.955876] erofs: mounted on /dev/loop2 with opts: noacl. [ 854.967220] erofs: read_super, device -> /dev/loop1 [ 854.967750] squashfs: SQUASHFS error: Filesystem uses "unknown" compression. This is not supported 07:27:10 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe203, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {&(0x7f0000010900), 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}, {}]}) 07:27:10 executing program 0: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000020006000e00d000020004", 0x1d}], 0x0, &(0x7f0000000080)) [ 854.976958] erofs: options -> noacl,user_xattr, [ 854.992659] erofs: blksize 8388608 isn't supported on this platform [ 855.000413] erofs: root inode @ nid 36 [ 855.005055] FAULT_INJECTION: forcing a failure. [ 855.005055] name failslab, interval 1, probability 0, space 0, times 0 [ 855.048389] CPU: 0 PID: 31831 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 855.055995] erofs: unmounted for /dev/loop2 [ 855.056296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 855.056302] Call Trace: [ 855.056323] dump_stack+0x1fc/0x2ef [ 855.056342] should_fail.cold+0xa/0xf [ 855.079941] ? setup_fault_attr+0x200/0x200 [ 855.084258] ? lock_acquire+0x170/0x3c0 [ 855.088227] __should_failslab+0x115/0x180 [ 855.092462] should_failslab+0x5/0x10 [ 855.096267] kmem_cache_alloc+0x277/0x370 [ 855.100415] __d_alloc+0x2b/0xa10 [ 855.103864] d_make_root+0x3e/0x90 [ 855.107394] erofs_fill_super+0x102f/0x12cc [ 855.111716] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 855.116985] ? vsprintf+0x30/0x30 [ 855.120429] ? wait_for_completion_io+0x10/0x10 [ 855.125087] ? set_blocksize+0x163/0x3f0 [ 855.129140] mount_bdev+0x2fc/0x3b0 [ 855.132751] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 855.138014] erofs_mount+0x8c/0xc0 [ 855.141546] ? erofs_kill_sb+0x20/0x20 [ 855.145423] ? alloc_pages_current+0x19b/0x2a0 [ 855.149990] ? __lockdep_init_map+0x100/0x5a0 [ 855.154468] mount_fs+0xa3/0x310 [ 855.157828] vfs_kern_mount.part.0+0x68/0x470 [ 855.162311] do_mount+0x115c/0x2f50 [ 855.165940] ? cmp_ex_sort+0xc0/0xc0 [ 855.169646] ? __do_page_fault+0x180/0xd60 [ 855.173872] ? copy_mount_string+0x40/0x40 [ 855.178098] ? memset+0x20/0x40 [ 855.181362] ? copy_mount_options+0x26f/0x380 [ 855.185848] ksys_mount+0xcf/0x130 [ 855.189381] __x64_sys_mount+0xba/0x150 [ 855.193344] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 855.197911] do_syscall_64+0xf9/0x620 [ 855.201701] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 855.206873] RIP: 0033:0x7fd12fca557a [ 855.210574] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 855.229460] RSP: 002b:00007fd12e618f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 855.237152] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca557a [ 855.244405] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fd12e618fe0 [ 855.251681] RBP: 00007fd12e619020 R08: 00007fd12e619020 R09: 0000000020000000 [ 855.258940] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 855.266200] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 [ 855.305431] ------------[ cut here ]------------ [ 855.310216] kernel BUG at fs/inode.c:1571! [ 855.319661] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 855.325039] CPU: 0 PID: 31831 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 855.332898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 855.342239] RIP: 0010:iput+0x727/0x860 [ 855.346140] Code: b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 84 18 fd ff ff 48 8b 3c 24 e8 33 d9 ee ff e9 0a fd ff ff e8 39 fc b8 ff <0f> 0b e8 32 fc b8 ff 48 89 ef e8 1a f7 ff ff 4c 89 f7 e8 b2 c6 6f [ 855.365028] RSP: 0018:ffff88809dac7a80 EFLAGS: 00010246 [ 855.370391] RAX: 0000000000040000 RBX: 0000000000000040 RCX: ffffc90005ed4000 [ 855.377645] RDX: 0000000000040000 RSI: ffffffff81a98937 RDI: 0000000000000007 [ 855.384905] RBP: ffff8880514c1128 R08: 0000000000000000 R09: 0000000000000000 [ 855.392153] R10: 0000000000000007 R11: 0000000000000000 R12: ffff8880b01067c0 [ 855.399410] R13: ffff8880514c1128 R14: 0000000000000000 R15: 00000000fffffff4 [ 855.406680] FS: 00007fd12e619700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 855.414884] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 855.420761] CR2: 00007fb24c751fc8 CR3: 000000009bb89000 CR4: 00000000003406f0 [ 855.428013] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 855.435261] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 855.442508] Call Trace: [ 855.445079] erofs_fill_super+0x1205/0x12cc [ 855.449391] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 855.454657] ? vsprintf+0x30/0x30 [ 855.458095] ? wait_for_completion_io+0x10/0x10 [ 855.462744] ? set_blocksize+0x163/0x3f0 [ 855.466785] mount_bdev+0x2fc/0x3b0 [ 855.470399] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 855.475683] erofs_mount+0x8c/0xc0 [ 855.479222] ? erofs_kill_sb+0x20/0x20 [ 855.483112] ? alloc_pages_current+0x19b/0x2a0 [ 855.487678] ? __lockdep_init_map+0x100/0x5a0 [ 855.492163] mount_fs+0xa3/0x310 [ 855.495513] vfs_kern_mount.part.0+0x68/0x470 [ 855.499990] do_mount+0x115c/0x2f50 [ 855.503596] ? cmp_ex_sort+0xc0/0xc0 [ 855.507301] ? __do_page_fault+0x180/0xd60 [ 855.511517] ? copy_mount_string+0x40/0x40 [ 855.515732] ? memset+0x20/0x40 [ 855.519007] ? copy_mount_options+0x26f/0x380 [ 855.523491] ksys_mount+0xcf/0x130 [ 855.527029] __x64_sys_mount+0xba/0x150 [ 855.530988] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 855.535555] do_syscall_64+0xf9/0x620 [ 855.539348] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 855.544526] RIP: 0033:0x7fd12fca557a [ 855.548230] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 855.567112] RSP: 002b:00007fd12e618f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 855.574801] RAX: ffffffffffffffda RBX: 0000000020000180 RCX: 00007fd12fca557a [ 855.582049] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fd12e618fe0 [ 855.589301] RBP: 00007fd12e619020 R08: 00007fd12e619020 R09: 0000000020000000 [ 855.596556] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 855.603802] R13: 0000000020000100 R14: 00007fd12e618fe0 R15: 0000000020000140 [ 855.611051] Modules linked in: [ 855.616551] ---[ end trace ca9183fc813cf146 ]--- [ 855.621784] RIP: 0010:iput+0x727/0x860 [ 855.632164] squashfs: SQUASHFS error: unable to read xattr id index table 07:27:11 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf017ffffffe", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 855.644789] Code: b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 84 18 fd ff ff 48 8b 3c 24 e8 33 d9 ee ff e9 0a fd ff ff e8 39 fc b8 ff <0f> 0b e8 32 fc b8 ff 48 89 ef e8 1a f7 ff ff 4c 89 f7 e8 b2 c6 6f [ 855.666486] RSP: 0018:ffff88809dac7a80 EFLAGS: 00010246 [ 855.673088] RAX: 0000000000040000 RBX: 0000000000000040 RCX: ffffc90005ed4000 [ 855.686274] RDX: 0000000000040000 RSI: ffffffff81a98937 RDI: 0000000000000007 07:27:11 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x1ff}], 0x0, &(0x7f0000000080)) [ 855.701457] RBP: ffff8880514c1128 R08: 0000000000000000 R09: 0000000000000000 [ 855.709950] R10: 0000000000000007 R11: 0000000000000000 R12: ffff8880b01067c0 [ 855.719924] R13: ffff8880514c1128 R14: 0000000000000000 R15: 00000000fffffff4 [ 855.727374] FS: 00007fd12e619700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 855.736296] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 07:27:11 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1003, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="6873717307000000911d675f004000000000b00006000e00d0000200040000001e010000000000000502000000000000b901000000000000ed010000000000008f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000c1010000000000000100000000000000de", 0x1fe}], 0x0, &(0x7f0000000080)) [ 855.753478] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 855.761660] erofs: read_super, device -> /dev/loop2 [ 855.767941] squashfs: SQUASHFS error: unable to read xattr id index table [ 855.806999] erofs: options -> noacl,user_xattr, [ 855.808457] CR2: 000055555673e708 CR3: 000000009bb89000 CR4: 00000000003406e0 [ 855.841859] erofs: root inode @ nid 36 [ 855.853755] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 855.860350] erofs: mounted on /dev/loop2 with opts: noacl. [ 855.862632] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 855.874848] Kernel panic - not syncing: Fatal exception [ 855.880811] Kernel Offset: disabled [ 855.884423] Rebooting in 86400 seconds..